BYOD
CHAOS (Control Havoc and Overhaul Security): The new Order for IT
1 min read
Mobility and the cloud have changed how we work, transforming pockets of downtime into bursts of productivity, with easy access to our most valued information and people. But this transformation has unleashed havoc. Security practices built on decades-old assumptions of placing controls at key points in the infrastructure won’t work in today’s hyper-connected application and […]
Can You Guess Your ROI on Your Secure Access?
1 min read
Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TEI (Total Economic Impact) Research. Four customers were interviewed for this study and covered use cases for policy-governed, unified access across the following use case scenarios: guest services; BYOD; full access across wired, wireless, and VPN; and policy networking. The calculation was based on a composite organization of 10,000 employees that reflected the four interviewed customers from higher education, utilities, and financial services markets.
Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5
1 min read
If you've worked on a K-12 wireless network, you'll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even...
User Behavior and Training Critical to Secure Mobility
1 min read
Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predicts there will be more than 10 billion mobile devices worldwide by […]
Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec
3 min read
Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rules. Typical indicators of operational complexity have been: The time that […]
Summary: Crossing the bridge – Five cloud services you should pay attention to
1 min read
A number of key applications consumed by businesses through premise-based deployments are now available from the cloud. Irrespective of where you are in the evolution to the cloud, here are five services that are worth your attention. Read my full article for a closer look!
Is Your K-12 Network Ready for Common Core Standards?
1 min read
What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the...
Security Realities of IoT (Internet of Things)
2 min read
Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, predominantly with security and IT professionals. 78% of […]
Cisco Partner Weekly Rewind – January 17, 2014
1 min read
Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way.