Real World Consequences:
Let me set the scene, your home with your family sitting on the couch watching TV. When all of the sudden a whole swarm of SWAT officers come busting through your front door on a no knock warrant. You and your family are separated, and you are forced to the ground at gunpoint with the officers screaming at you about your disgusting ways, shouting “We know WHAT YOU ARE, PEDOFILE!”
But that will never happen to you right? You don’t ever visit those types of websites, the very thought of such things turns your stomach. That is just what a resident of Buffalo, New York thought earlier this year, until it happened to him and his wife. Now as it turns out he was completely innocent, but that fact did not save him from having his door broken down or having a weapon held on him while he was being detained and his house searched by the FBI and the Buffalo Police. (And no they did not pay to fix his door.)
Read More »
Tags: cyber-security-month-2011, security, wireless
I had the pleasure of meeting up with both Leo Ploner, Publishing Director, Industrial Ethernet Book (IEB) and Tom McNulty from the Chicago, US office recently here in Silicon Valley recently. I was pleased to see that Cisco had contributed to an article in the 65 / 35 Issue of the Industrial Ethernet Book around the topic of RFID and industrial WiFi – a topic close to my own heart in terms of previous blogs of mine (Intro to RFID, Continental Tire, Boeing, and John Deere).
The first Industrial Ethernet Book was published in 1999. Since then it become an excellent information source for industrial networking and communication technology, and aims to provide unbiased editorial views focused on both process and discrete manufacturing industries. The editorial content is aimed at end users, system integrators and vendors within factory automation and process automation.
The article starts with the recognition that “Increasingly ‘smart’ devices, which include radio frequency identification (RFID) tags and sensors that have advanced diagnostics, are contributing to the billions of devices now connected to IP networks. This proliferation of smart devices is referred to by some as the ‘Internet of Things’, and it is projected to grow to trillions of devices that will be connected using the emerging IPv6 protocol (ref1). For manufacturers, a growing number of connected smart devices promises to revolutionise portability, mobility, context-aware condition and use of critical assets.” Read More »
Tags: aeroscout, automation, Boeing, Borderless Networks, Cisco, context-aware, Continental Tire, dreamliner, Enterprise, Factory, industrial, industrial networking, john deere, location, mobility, networking, operational excellence, operations excellence, productivity, rfid, supply chain, unified communications, Viracon, wireless
It is no longer a question of “if” your organization will face the new reality of mobile device proliferation, just an ever closer “how soon.” Users expect the network to enable trends like Bring Your Own Device (BYOD), and they aren’t just using smartphones and tablets to be more productive, they are falling in love with them. For businesses, simply allowing access isn’t the answer. It’s a question of relevant, secure access across the entire network, while protecting corporate assets and delivering an optimal user experience. Cisco focuses on exactly that -- how to enable a simple and secure mobility experience, with a consistent end-to-end architecture across wired, wireless and VPN access.
As a cornerstone of this wired-wireless access architecture, the Cisco Identity Services Engine (ISE) has already been helping customers like Whittier Union High School, San Antonio Water System and BlueWater Communications Group apply consistent security across the entire network through a centralized, single policy source.
Whittier Union High School District, a California high school district serving more than 13,600 students, was facing the challenge of mobile devices. Both faculty and students were bringing their personal devices on campus, many for educational apps and tools.
“It’s becoming increasingly critical to provide employees, students, and visitors access to our network and extensive educational resources given the growing expectations of our tech-savvy population,” stated Karen Yeh, Director of Information Technology, Whittier Union High School District.
Whittier needed a way to apply differentiated policy across their student and staff populations, somehow managing access for both personal and corporate devices, all without increasing IT resources. Karen called Cisco, and two weeks later her team was deploying the Cisco ISE, implementing a single point of security policy for their networks across wired, wireless and VPN. Considering that Richard Nixon, the 37th president of the US went to Whittier High School, the flexible network access enabled by Cisco ISE may be empowering the next generation of leaders, scientist or artists. But, mobile devices aren’t confined to education. San Antonio Water System, a public utility owned by the city of San Antonio, is seeing surprisingly similar issues.
Read More »
Tags: 802.11n, 802.1x, byod, Identity Services Engine, ISE, mobile devices, mobility, network management, policy, security, Smartphones, Tablets, vpn, wi-fi, wifi, wireless, wireless LAN, wlan
Looking to connect your business to the world? These resources can help
They’re small, often kept out of view, and rarely thought about beyond the purchase. However, without a reliable router, you can’t securely connect to the Internet. Whether wired or wireless, a router is critical to connecting your company to your world of employees, partners, and customers. A router is also your first line of defense for protecting your network resources against malicious attacks. So choosing the best routing and wireless solutions for your business are key to ensuring that you’re building the right network to support your business today and tomorrow.
In this third installment of our Technology Roundup series, we offer some resources to help you understand routers and wireless networks and make the best decision for your small business network.
Read More »
Tags: routers, small business, small business network, wireless
Consumers today are highly attached to mobile technology and are using it as part of their daily lives and shopping experiences. According to Nielson forty percent of mobile consumers over 18 in the U.S. now have smartphones. As these users consume bandwidth to send and retrieve content from SMS, MMS, Email, and social media apps such as Facebook, YouTube and Twitter that supports pictures and videos, they are increasingly looking to Wi Fi to improve their experience.
Are retailers offer their shopping channels (including store, web, voice and social media) to consumers, the consumers are expecting to be able to use their mobile device across all the channels whereever they are, at home, at work, and IN YOUR STORE.
As a retailer, facilitating mobility in the retail store can differentiate you from the competition, plus help you meet the soaring expectations of your customers. On the other hand, allowing access to your wireless network poses potential risks. You’ve got to ensure the security of your data, comply with PCI mandates, prevent misuse and interference, and provide consistent bandwidth for your own operations.
For help retailers address this issue, we are hosting a webcast on October 20th 10:00am Pacific Time titled
Read More »
Tags: Cisco, compliance, mobility, pci, retail, retaililng, security, wireless, wireless access point, wireless networking