BYOD

Blog post

Securing Mobile Data in the Event of Device Loss or Theft

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

September 4, 2014 4 min read
Blog post

Modernizing Public Safety Communications

Modernizing Public Safety Communications Your existing radios and voice system do more, with Cisco IPICS 4.8 If your agency uses Cisco Unified Communications as well as PTT radio communications, you can make both more valuable by adding Cisco IP Interoperability and Collaboration System (IPICS). Hundreds of public safety agencies around the world already use Cisco […]

Blog post

How Internet of Things Is Transforming Public Safety

How Internet of Things Is Transforming Public Safety Use Case 1: BYOD for Police Officers The Internet of Things refers to connecting currently unconnected people and things, and it’s transforming public safety. This blog explains how police officers can securely use commercial smartphones and tablets in the field. Future blogs will describe other ways to […]

Blog post

The Internet of Things Empowers Public Safety: Please Visit Cisco at APCO 2014 Booth 461

  Public safety organizations worldwide are increasingly adopting and using secure broadband networks, supporting open standards and multivendor technologies, and using new public safety applications, while adopting new policies for bring your own device (BYOD) using Apple iOS and Google Android smartphones and tablets for their personnel. The rate of adoption is continuing to accelerate […]

Blog post

Securing Mobile Data: What’s Your Plan?

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

July 24, 2014 1 min read