Cisco Blogs


Cisco Blog > Mobility

MSE Blog Series Part 4: wIPS

To continue the MSE Blog Series, I’m going to take you on a journey to dig deep into one of the features of Release 7.4, wIPS!

With the increasing popularity of BYOD, wireless security has become an eminent concern for Network Administrators. Cisco Unified Wireless Intrusion Prevention Solution (WIPS) is dedicated to protecting the wireless network security and provide a secure wireless experience to the clients. Cisco, allied with Flukes Networks, to constantly monitor new wireless intrusion techniques, develop new signatures and provide preventive solutions. In 7.4 release, we added the capability of detecting 802.11 frame fuzzing attacks. The new signatures patterns, for detecting such attacks, are available through WIPS profile configuration in NCS. These signature patterns are enabled by default and provide the full level of security. The user, however, could tune them to get the desired protection level.

wips 1

Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Looking Beyond the Mobile Phone

Why the Network Will Drive the Next Wave of Mobility

Forty years ago, the first phone call was placed on a handheld mobile phone. The call was placed by Martin Cooper at Motorola’s Communications Systems Division, who phoned a competitor at Bell Labs—and launched a new era. The brick-like prototype he used weighed two pounds and cost nearly $4,000.

Reflecting on the first mobile phone call also gives us a great opportunity to think about where mobile communication will take us in the years to come. In a few short decades, cell phones have evolved from a clunky appliance used mainly by high-powered businesspeople, into a key part of everyday life. Read More »

Tags: , , , , ,

Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]

Protecting Your Business in an “Any to Any” World

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Read More »

Tags: , , , , , , ,

Have you registered for Part 1 of “Activate the IT Transformation with Unified Access” Webinar Series?

This Wednesday, we’re kicking off a great webinar series that will walk you through the Cisco Unified Access solution. With the five-part series, we’re breaking down the one policy, one management, one network story into technical, informative chunks. Part 1 is in just two days, so if you haven’t registered, CLICK TO REGISTER

Read More »

Tags: , , , , , , , , , , , , , , , ,

Activate the IT Transformation with Cisco Unified Access: Part 1

With the ever growing demands placed on IT organizations to “do more with less” it is becoming apparent that the way we deploy the network infrastructure, how we administer policies and how we manage the whole thing needs to evolve.

Why is IT spending so much time maintaining separate wired, wireless and VPN networks? We need to focus on the business that is banging on the door telling you to support more mobile and wired devices, more bandwidth hungry applications and extend that support well beyond the walls of corporate facilities.

How can we simplify how IT operates and still deliver a high-performance, high-quality connected experience? Cisco Unified Access can help! We announced the webinar series earlier this week, and part 1 is just around the corner.

In next Wednesday’s webinar (CLICK TO REGISTER) we will discuss:

  • The industry perspective regarding challenges surrounding, BYOD, Mobility and the Internet of Everything
  • The latest Cisco technology that can help you simplify and optimize you network
  • How a unified access network can improve performance and operations
  • Deploying consistent and contextual policies will improve access control and enforcement
  •  How reducing operational complexity can accelerate device deployment and end user problem resolution.

Read More »

Tags: , , , , , , , , , , , , , , , ,