Cisco Blogs


Cisco Blog > Mobility

Real Innovation in Wireless Security

A few weeks ago, Gartner released their MarketScope for Wireless LAN Intrusion Protection Systems. The paper is designed to provide an evaluation of the currently available WIPs solution and, as you might guess, Cisco is one of the featured vendors.1

I spent several weeks, working behind the scenes to provide customer references and content for Gartner. During that effort, I was struck by the level of innovation Cisco has introduced into wireless security. Real innovation that works in the real world. We not only offer two levels of wireless intrusion protection, we also deliver three ways to deploy those solutions.

Cisco’s backend intrusion detection and prevention is built into every Cisco wireless network deployment, providing always-on security and preventing wireless threats from connecting to the wired network. This level of security requires no licenses and no additional equipment. Pretty generous, I think and no doubt why more than 70 percent of Cisco WLAN customers use this WIPS capability.

Leveling up to Cisco Adaptive Wireless IPS provides security optimized for the wireless environment. Using the Cisco Mobility Services Engine, aWIPS is able to locate, identify, and mitigate over-the-air security threats—even if they’re only transmitting intermittently. Through the Mobility Services Engine’s location capabilities, aWIPS is able to discern whether intrusion signatures are multiple rogues or one rogue detected by multiple access points. That’ll eliminate a lot of nervous moments.

Read More »

College Prerequisite: Wireless 101 @ University of Louisville

My dad went to UC Berkeley for engineering, and he always told us that his college life was the definition of minimalist: all he needed was his books, the library, and his intramural volleyball team, dubbed “Open Set” by his teammate (who was a math major). He is currently helping my sister move into her freshman dorm, and you’d be amazed by his current expectations for colleges. Of course they need to have cafeterias serving international fare. Of course they need to have gyms with ellipticals, treadmills, and pools. Of course they need to have libraries with state of the art resources. Of course he, and his child, should be able to get Wi-Fi on their smartphone and laptop in each of those places and everywhere in between! And that’s just what the PARENTS are thinking.

Just like the cafeterias, the gyms, and the libraries, wireless connectivity is not just something that would be nice to have, but a requirement to keep current and prospective students (and their parents, AND their multiple devices) satisfied.

IT organizations all across the world are faced with a ubiquitous challenge of how to handle the implications of BYOD. Corporations have the luxury of implementing a top down approach, defining and enforcing policies amongst its workforce; but  other environments, especially schools and universities, are faced with additional pressures from their user populations. Higher education in particular poses stringent demands on support and bandwidth for their own devices.

Meet the University of Louisville, 22,250 students strong. The problem: a legacy network unable to meet the current requirements of today’s higher education campuses. With 6400 faculty and staff across 8.5 million square feet and 114 buildings across three campuses, the growing organization needed a strong, stable, scalable, wireless solution.

Read More »

Pentagon Secure In Move Towards BYOD

Last week, it was announced that Cisco is launching “Public Sector BYOD Thursdays” in which you can expect Cisco subject matter experts to discuss the latest happenings relevant to Public Sector around the Bring Your Own Device trend (BYOD).

One of the main concerns often cited when it comes to adopting a BYOD strategy in the workplace is the ability to maintain tight security. With countless personal devices transmitting critical, confidential and sometimes classified data, BYOD environments demand structured protocols for device registration, policy control, communication transmissions and information sharing.

Developing these policies is completely doable, with the right processes and infrastructure in place. To watch the process in action, we can look to the Department of Defense (DOD), which on June 15 released its own mobile device strategy—a document that lays the groundwork for making secure employee mobility possible at the agency.  One of the goals in this mobile device strategy is to see if BYOD is feasible for wider adoption within the organization.

Read More »

Four Steps to Prepare Your Network for the Challenges of BYOD and Pervasive Wireless

I know BYOD is hitting close to home when I’m receiving notices from the local middle and high schools requiring students to bring their own tablets to class. It is efforts like these that show BYOD (Bring Your Own Device) as more than simply a marketing term being thrown around by various network vendors—it’s undeniably real and it’s all around us.

With that in mind, the promise of BYOD will come with its challenges—the deployment and management risks involved threaten to be a major headache for IT managers if they are not properly prepared for it. When it comes to wireless networks, preparing and planning for potential future technological trends is always a best practice. We know our customers will be faced with the challenge of preparing for BYOD, and we want to help. That’s why we are hosting a webinar called Pervasive Wireless for BYOD.

We plan to discuss how to best prepare your network for the challenges and management risks inherent to a BYOD deployment:

  • New user expectations in an evolving workplace landscape.
  • The enterprise no longer owns the mobile devices accessing the network.
  • IT has lost visibility and control of user devices and applications.

With BYOD, anywhere, anytime, any device usage is expected from the user, and the workplace is now globally dispersed with users touting mixed wireless devices. This paradigm shift calls for dramatic changes in how IT controls and manages users, devices, and applications.  It is critical to be aware of these challenges when planning, deploying and managing your network for BYOD.

To give you a taste of what is included in the webinar; here are four steps we will be discussing:

Read More »

Tags: , , , , , ,

Lost Not Found

A few years back, I was traveling in the Southwest. Since I needed to work while on the road, I made reservations for a hotel that advertised in-room WiFi. I guess I should have paid attention to the disclaimer that the hotel was “not responsible for errors or omissions.” The IT vendor that installed the hotel’s WiFi network had apparently forgotten the WiFi. And wired access. And any connections of any sort.

But I had work to do, so I headed to the lobby in search of a WiFi signal and a quiet corner. Unfortunately, the only thing that was quiet was the WiFi network. Even in the coffee shop. The barista served up a mean macchiato but still no WiFi.

Read More »

Tags: , , , ,