In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release.
During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors.Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.
Read more at http://blogs.cisco.com/borderless/ciscos-policy-enforcement-solution-delivers/
Already sold? Join us for the free webinar, Thursday Sept 5 at 10am PST to learn more.
Tags: bring your own device, byod, Cisco, ISE, mobile, mobile security, on-board, policy, security
Let’s start with how well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco just released new global research (white paper) , Cisco Connected World International Mobile Security study, that explores the mobile worker’s view points on working remotely, connecting to corporate and their sense of security. Some of the findings are worth reflecting on to help you set the course for your mobile security efforts.
There is no question; the movement for mobile personal devices in the workforce has been well recognized. A recent response to this trend includes employers (almost half) offering to fund workers buying their own devices. Allowing “chose your own” device will attract and retain talent and reduce costs (see recent IBSG BYOD research)—but what are the security implications?
There were a couple striking data points to call out:
- 63% download sensitive data on their device …and the frequency significantly increases in some countries—
- Most believe remote access is a privilege—yet in some countries they believe it’s a right as a worker—
- Most are diligent when a pop up appears and read through the details on what it really means. Yet, some workers from select countries tend to be generally less careful.
- 60% admit to engaging in risky behavior on a device (personal or company-owned), connected to corporate resources,
So, who really owns the mobile security issue—mobile workers do not take full responsibility for a safe device--as expressed in their high confidence in their IT with over 84% believing that IT will protect them from threats no matter what device. Read more on http://blogs.cisco.com/security/how-secure-is-your-mobile-worker-2/
Tags: Black Hat 2013, Bring your Own Device (BYOD), Cisco, Cisco ISE, Connected Word International Mobile Security, mobile security, secure access, TrustSec
This is the third post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. Be sure to read the first two blogs and watch the videos – First Step to Enterprise Mobility: Build the Mobile Structure and Second Step to Enterprise Mobility: Go Virtual.
In this blog series, we’ve discussed two important steps enterprises can take unleash the power of enterprise mobility. We’ve covered how building a mobile structure can arm enterprises with the appropriate architecture to increase efficiency and revenue. In addition, we highlighted how enterprises can go virtual by implementing desktop virtualization.
Our third step -- preparing for the division of devices -- relies on both structure and a mobile workforce. How can enterprises enable and support the proliferation of employee-owned devices without burying their IT department and putting corporate data at risk? Here’s a quick checklist to help make it happen:
1. Use a unified network infrastructure that facilitates secure, virtual workspace delivery across wired, wireless, VPN, and cellular networks.
As wireless access becomes more pervasive, performance and reliability expectations are the same as what is expected from a wired network. Features such as reliable connectivity, application response times and voice, video and real-time collaboration solutions all depend on a seamless delivery for both wired and wireless devices. This fundamental shift demands that IT monitor and have a unified solution in place (i.e. a single physical infrastructure) for both corporate wireless LAN (WLAN) and wired LAN. This converged infrastructure will enable the right quality of experience for users, independent of their devices.
A unified network infrastructure can also make sure that IT is able to identify each device connecting to the network and authenticate the person using it.
Read More »
Tags: bring your own device, byod, Cisco, enterprise mobility, mobile, mobile device, mobility, network, wi-fi, wifi, wireless, wireless network
At the CableLabs Summer Conference last week in the Keystone Conference Center outside of Denver, Colorado, Cisco CMX was demonstrated live on stage showing up to the moment information on the venue and the attendees.
The audience consisted of approximately 400 attendees, with the room at full capacity, mostly business leaders from CableLabs member organizations including all the top tier operators. Read More »
Tags: location, location analytics, location based services, location services, location-based, mobile, mobility, municipal, nice, outdoor, services, wi-fi, wi-fi analytics, wifi, wifi analytics, wireless
Teachers, students, and staff with their varied wired or wireless gadgets and corresponding application access makes up a daunting sea of devices for any IT professional, whose responsibility is to provide optimized network performance.
In his latest blog, Prime Your Network for the Rise of the Devices, Cisco’s Rahul Chohan discusses how Cisco Prime Infrastructure, a part of Cisco BYOD Solutions for K12 Education helps simplify network management and improves operational efficiency with converged wired and wireless management. Rahul’s blog covers how Cisco Prime Infrastructure helps with device management, network performance and IT simplification. How exactly can it do this? You’ll have to read his blog to find out.
Don’t miss our demo-heavy webinar next week on August 21 covering Prime Infrastructure--Register here.
For more on Cisco BYOD Solutions for K12 Education page.
Tags: 802.11ac, bring your own device, byod, Cartoon, Cisco Prime Infrustracture, cleanair, education, Google, K-12, K12, mobility, prime, wireless