Cisco Logo


Mobility

Protecting Your Business in an “Any to Any” World

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development.

This episode underscores how important security is in a more mobile, more connected world – attackers are paying attention, using these industry trends to create targeted and sophisticated attacks that can bypass traditional defenses. The Internet of Everything is taking shape, and the number of people and things going online is soaring. According to Gartner’s Top 10 Strategic Technology Trends for 2013, 30 billion things will be connected by 2020.

And the things connecting will be more than PCs, tablets, and smart phones. Devices like intelligent sensors, healthcare equipment, and even utility systems will be getting online. According to the Cisco Visual Networking Index (VNI), machine-to-machine (M2M) connections will grow from 5 percent of all mobile connections to 17 percent in 2017. In this new, mobilized world of “any-to-any” connections, you can’t secure every device—you need a new approach to security.

With a holistic, network-based security strategy, you can give your employees the freedom to work the way they want, without putting themselves, or your company, at risk. Read further here.

In an effort to keep conversations fresh, Cisco Blogs closes comments after 90 days. Please visit the Cisco Blogs hub page for the latest content.

2 Comments.


  1. Do you think mobile devices will be used as a primary means of hacking in the future as the trend towards mobile continues? I’ve used an SSH client on my phone so I know it’s possible.

       0 likes

  2. Riyas Vallikode

    I have encountered a similar issue, where I could make out that the Hacker-that individual was an Ex-employee of the firm which passed the information and data via that network. So is there a way to bar this? Everyone takes with him what he learned from somewhere and may sometimes use it for their work and workarounds. so is the danger !

    Technology is not always positively used and thats how technology advances.

       0 likes

  1. Return to Countries/Regions
  2. Return to Home
  1. All Mobility
  2. All Security
  3. Return to Home