I have a special treat for you today: IT’S WIRELESS FIELD DAY!
Thanks to Stephen Foskett of Gestalt IT, we and the Cisco Wireless Business Unit, or WNBU (pronounced “Win-Boo”), are hosting some very special guests at our very own San Jose campus. This is a part of a series of 2-day events where group of influential bloggers tour networking companies across Silicon Valley to learn about the latest and greatest in the wireless networking space. (For more on Tech Field Day, visit http://techfieldday.com)
We invite you to join us LIVE (provided we are lucky enough to be spared from technical difficulties) today, Friday September 14th from 1:30-3:30pm. We’ll be hosting a livestream RIGHT HERE on our blog. You can also visit http://techfieldday.com/event/wfd3/ or follow the hashtag #WFD3 on Twitter.
UPDATE: WE’RE LIVE!
UPDATE (3:00pm): LiveStream is now over: We will be uploading the recorded videos when they are ready
Read More »
We know you were in much anticipation for this week’s Public Sector BYOD Thursday post…drumroll please!
User expectations around using personal devices have evolved rapidly over the past few years, and the BYOD trend has been the result of users demanding to use personal devices and applications the way they want, when they want it on the device of their choosing.
Last week, I talked about the Pentagon’s move toward BYOD. With the BYOD movement here to stay, government agencies are starting to jump on board.
Read More »
A few weeks ago, Gartner released their MarketScope for Wireless LAN Intrusion Protection Systems. The paper is designed to provide an evaluation of the currently available WIPs solution and, as you might guess, Cisco is one of the featured vendors.1
I spent several weeks, working behind the scenes to provide customer references and content for Gartner. During that effort, I was struck by the level of innovation Cisco has introduced into wireless security. Real innovation that works in the real world. We not only offer two levels of wireless intrusion protection, we also deliver three ways to deploy those solutions.
Cisco’s backend intrusion detection and prevention is built into every Cisco wireless network deployment, providing always-on security and preventing wireless threats from connecting to the wired network. This level of security requires no licenses and no additional equipment. Pretty generous, I think and no doubt why more than 70 percent of Cisco WLAN customers use this WIPS capability.
Leveling up to Cisco Adaptive Wireless IPS provides security optimized for the wireless environment. Using the Cisco Mobility Services Engine, aWIPS is able to locate, identify, and mitigate over-the-air security threats—even if they’re only transmitting intermittently. Through the Mobility Services Engine’s location capabilities, aWIPS is able to discern whether intrusion signatures are multiple rogues or one rogue detected by multiple access points. That’ll eliminate a lot of nervous moments.
Read More »
My dad went to UC Berkeley for engineering, and he always told us that his college life was the definition of minimalist: all he needed was his books, the library, and his intramural volleyball team, dubbed “Open Set” by his teammate (who was a math major). He is currently helping my sister move into her freshman dorm, and you’d be amazed by his current expectations for colleges. Of course they need to have cafeterias serving international fare. Of course they need to have gyms with ellipticals, treadmills, and pools. Of course they need to have libraries with state of the art resources. Of course he, and his child, should be able to get Wi-Fi on their smartphone and laptop in each of those places and everywhere in between! And that’s just what the PARENTS are thinking.
Just like the cafeterias, the gyms, and the libraries, wireless connectivity is not just something that would be nice to have, but a requirement to keep current and prospective students (and their parents, AND their multiple devices) satisfied.
IT organizations all across the world are faced with a ubiquitous challenge of how to handle the implications of BYOD. Corporations have the luxury of implementing a top down approach, defining and enforcing policies amongst its workforce; but other environments, especially schools and universities, are faced with additional pressures from their user populations. Higher education in particular poses stringent demands on support and bandwidth for their own devices.
Meet the University of Louisville, 22,250 students strong. The problem: a legacy network unable to meet the current requirements of today’s higher education campuses. With 6400 faculty and staff across 8.5 million square feet and 114 buildings across three campuses, the growing organization needed a strong, stable, scalable, wireless solution.
Read More »
Last week, it was announced that Cisco is launching “Public Sector BYOD Thursdays” in which you can expect Cisco subject matter experts to discuss the latest happenings relevant to Public Sector around the Bring Your Own Device trend (BYOD).
One of the main concerns often cited when it comes to adopting a BYOD strategy in the workplace is the ability to maintain tight security. With countless personal devices transmitting critical, confidential and sometimes classified data, BYOD environments demand structured protocols for device registration, policy control, communication transmissions and information sharing.
Developing these policies is completely doable, with the right processes and infrastructure in place. To watch the process in action, we can look to the Department of Defense (DOD), which on June 15 released its own mobile device strategy—a document that lays the groundwork for making secure employee mobility possible at the agency. One of the goals in this mobile device strategy is to see if BYOD is feasible for wider adoption within the organization.
Read More »