BYOD

April 4, 2013

NETWORKING

Johnson City Schools Advance Wireless Network With Cisco BYOD Solutions for K12 Education

Cisco BYOD Solutions for K12 Education bring the freedom to learn anywhere, anytime while adding a dynamic, vivid component to education.

April 4, 2013

SECURITY

Consider the Best Approach for Your BYOD Mobility Environment

Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increasingly being forced to accommodate for business use. This is not new news. We observe this pattern through our customers today and live this phenomenon within our own everyday work environment at Cisco. Here at Cisco, employees have the flexibility to choose their device and to securely connect to voice, video and data services from anywhere under an Any Device policy. Cisco manages over 64,000 mobile devices today.

April 4, 2013

SECURITY

Securing a BYOD Environment Requires Deployment Flexibility

When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First and foremost for IT organizations was gaining visibility to all mobile devices — rogue or authorized — that were present on the wireless network. Cisco ISE delivered that capability, providing IT staff with a detailed view of what types of mobile devices were on the network. Coupling that with ISE's native BYOD enrollment capabilities or the active management capabilities of MDM platforms — as well as network intelligence from the Cisco Wireless Network — was key to gaining full control over this Wild West of mobile devices

April 1, 2013

NETWORKING

Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]

Protecting Your Business in an “Any to Any” World Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. […]

March 26, 2013

SECURITY

Network Threats Are Hitching a Ride in Mobile Environments

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access. Just a few weeks ago, multiple leading social networking […]

The Secret to Mobility in a Multiple Device World

The Internet of Everything is all around us. People are connecting on the go in new ways, and they expect fast, secure network connections that follow them anywhere and everywhere —at work, at home, at play, at the mall, at the gym, or even at the ballpark. Not so long ago, getting on the Internet […]

March 21, 2013

NETWORKING

Infrastructure for Megatrends

In my job as Cisco’s Field & Sales CTO for Borderless Networks in the Cisco EMEAR Theatre, I have the privilege of working directly with many Cisco customers and partners. The majority of these folks are what you’d call “Technical Decision Makers” and CTOs. They’re the IT leaders who do the planning, the strategy, and […]

March 20, 2013

NETWORKING

Enterprise Networks and the Drive for IPv6

It was not that long ago that whenever I read an article about IPv6, it usually discussed how the IPv4 Address depletion in other countries. At that time, the adoption of IPv6 was coming from other countries that where the v4 address space was depleted, the US Government, or Service Provider. Well fast forward only […]

March 14, 2013

SMALL BUSINESS

Why Engage Expert IT Services for Mobility and BYOD?

Three Reasons: More Productivity, Revenues, and Savings How can you control the connections and user experiences—and security—of BYOD and other mobile devices that access your business network?  Maybe you or your IT staff have the expertise and time to do-it-yourself (DIY). Or, maybe not. In my last blog,I outlined the benefits of mobility technologies and […]