“Collaboration” usually means “people working together productively by sharing voice, video, and data”. Inside Cisco, the standard idea of Collaboration includes a lot of IT Technology, like:
- all voice-based Unified Communication (that is, all IP Telephony from hardware and software phones, and all Unity voicemail, and all Contact Centers)
- all Video conferencing (from Jabber or WebEx clients, video phones, desktop video, room TP, and immersive TP),
- all streaming video like Cisco TV (IP/TV) for large multicast events, and
- software clients like email, web sites and blog sites and document repository sites, Jabber IM, voice and video, and WebEx voice, video and data
But sometimes Collaboration means more. For example, Cisco IT likes to say that we “enable people to collaborate with any device, from anywhere, at any time” which really expands the scope of collaboration. Read More »
Tags: any device, byod, Cisco IT, cisco on cisco, coc-collaboration, collaboration, global, mobility, productivity
Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to improve the security of their networks and protect sensitive client data. While attackers have always targeted IT users, in 2015 the trend is shifting where the primary target is to take advantage of user behaviors to breach the network. This last point is important because once the user has been compromised or their credentials have been lifted, the attacker then has access to anything important that is connected. The Cisco 2015 ASR shows that only 43% of organizations leverage identity administration and provisioning to properly secure their networks and data. This means that over half of organizations don’t know who is accessing their networks, where they’re going or coming from, or what they’re using and if it is even authorized based on business policy. As we all know, once someone unauthorized gets inside it can be challenging to track down the incursion and negate the threat.
Read More »
Tags: 2015 annual security report, bring your own device, byod, internet of things, IoT, NAC, security
As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only outwits attackers but also makes security a competitive advantage that enables business growth.
By taking a threat-centric and operational approach to security, organizations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.
Using Cisco technology, this approach is enabled by broad visibility for superior intelligence across the extended network, where all the solutions a customer deploys communicate with each other. Organizations using siloed solutions will have holes in their security. Siloed solutions do not provide full protection since they do not communicate with one another, thus leaving security gaps and the inability to create actionable intelligence.
Cisco can provide a holistic solution to this problem by reducing the attack surface and extending protection across the network – before, during and after attacks.
Read More »
Tags: 2015 annual security report, Big Data, byod, Identity Services Engine, ISE, Managed Threat Defense, security
Whether you are among the 8,000 attendees participating at Cisco Live Milan in-person or among our many virtual attendees catching the live web broadcast, you’ll find lots to help you with your mobility-related projects.
Read More »
Tags: #CLEUR, 11ac, 802.11ac, byod, Cisco CMX, cisco live, innovation, meraki, Meraki Challenge, milan, Milano, mobile, mobility, technology, wi-fi, wlan, workspace
Cisco Identity Services Engine (ISE) is commonly associated with use as a network access policy, BYOD and AAA platform. But to do its job in network policy, ISE collects a great breadth of telemetry about network users and devices. Whether a device is trying to access the network or is already connected, ISE knows specifics about:
- What the device type is (e.g., iPad Air 2 running iOS 8.1.2)
- How it is connected to the network (e.g., enterprise Wi-Fi)
- From where (e.g., access point in “California/SanDiego/Building 2/Floor 3/South”)
- Security and compliance posture of the device (e.g., Antimalware operating and up to date? PIN lock configured?)
- Who the user is on the device…or if it even has a user (e.g., printer)
- What policy and AD/LDAP group the user belongs to (e.g., “IT Admin” authorization group)
- Related session IP address and MAC address
While ISE primarily uses all this telemetry to establish network policies, it also shares it for use by other IT platforms. By doing so, ISE helps these platforms become more identity and device aware and thus more effective in a variety of ways. And this is where Splunk comes in.
Read More »
Tags: byod, Cisco ISE, Identity Services Engine, Network Access Policy, Splunk