Avatar

Kathy Trahan

Senior Security Solutions Marketing Manager

Global Marketing Corporate Communications

Kathy Trahan is a Senior Security Solutions Marketing Manager in the Product Solutions Marketing group for Security at Cisco. Kathy provides outbound marketing for the Secure Unified Access solutions. With more than 15 years of experience in high tech and IT Security, Kathy has held prior roles at Check Point, NetApp, Nokia, Sun Microsystems, Symantec and TrendMicro. She lives in San Jose, CA with her husband and two children.

 

Articles

August 27, 2013

WIRELESS AND MOBILITY

[Summary] How Secure Is Your Mobile Worker?

Let’s start with how well do you know your mobile worker?  Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage.  Cisco just released new global research (white paper) , Cisco Connected  World International Mobile Security study, that explores the mobile worker’s view points […]

August 22, 2013

SECURITY

How Secure is Your Mobile Worker?

How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World International Mobile Security study. They explore the mobile worker’s view points concerning […]

July 30, 2013

SECURITY

How Secure is Your Secure Access?

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?”  Fast forward to July, and I wish I had this SANS review on ISE to offer […]

May 7, 2013

SECURITY

Shedding More Light on MDM

Starting with a primer on MDM, Networking 101: MDM, Jimmy Ray answers the questions on what is MDM and what can it do for my organization in his entertaining and educational white board approach.

April 4, 2013

SECURITY

Securing a BYOD Environment Requires Deployment Flexibility

When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First and foremost for IT organizations was gaining visibility to all mobile devices — rogue or authorized — that were present on the wireless network. Cisco ISE delivered that capability, providing IT staff with a detailed view of what types of mobile devices were on the network. Coupling that with ISE's native BYOD enrollment capabilities or the active management capabilities of MDM platforms — as well as network intelligence from the Cisco Wireless Network — was key to gaining full control over this Wild West of mobile devices

February 28, 2013

SECURITY

Consider Mobile Work Patterns and Security Impact

Mobility and application access capabilities have encouraged many of today’s work patterns. Some work behaviors were recently noted in a Cisco-commissioned research report on mobility and BYOD comparing IT and end...

February 11, 2013

SECURITY

Securing Any Device—For the Exceptional Connected Experience

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex […]

December 11, 2012

SECURITY

The Power of Mobility & Learning

The mobility trend holds great promise for improved productivity and new engagement models. These are most powerful in a learning effort—imagine learning anywhere and anytime. I just wish I had the Internet and the mobility that students have today when I went to school. Yet, mobility is an IT tsunami that will not recede. One […]