Greater Dynamic Controls for Secure Access and Mobility
Businesses today are required to meet multiple challenges with respect to connecting users to applications. First, it is no secret that the demands of employees and users are great–they expect access to enterprise resources and their work via more mediums than ever before–by personal laptops, tablets and smartphones, both at home and on the road. […]
#CiscoChampion Radio S1|Ep 24 Identity Services Engine (ISE)
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking about Identity Services Engine (ISE) with Cisco Program Manager (Cisco IT, Security) Greg Rasner. Lauren Friedman (@Lauren) moderates and Travis Newshott and Brandon Carroll are this week’s Cisco Champion guest hosts. Listen to the Podcast. Learn about the Cisco Champions Program HERE. […]
Secure Access for the Real World, Really?
Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack […]
Inside Cisco IT Takes You on Our Security Journey
Would you jump on a horse without consulting someone else who is at least somewhat familiar with horses? You know, like a cowgirl or boy? Probably not. At least not if you’re interested in staying in the saddle versus tumbling to the never-soft earth. While Cisco IT doesn’t have any expertise in horseback riding (I […]
[Summary] How Secure Is Your Mobile Worker?
Let’s start with how well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco just released new global research (white paper) , Cisco Connected World International Mobile Security study, that explores the mobile worker’s view points […]
How Secure is Your Mobile Worker?
How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World International Mobile Security study. They explore the mobile worker’s view points concerning […]
Identity and Device Aware IT Platforms Make Life Easier
Life is generally a lot easier when you have all the facts. Especially if those facts are actually accurate. Nowhere does this ring more true than in the life of an IT professional. Often times a day in an IT shop is a lot like that grade school game of telephone where information gets passed […]
Design & Implementation Guide: What’s In a Name?
This may seem to some a rhetorical question, right? It’s in the name! A guide that describes the design and implementation of a system or solution. That seems simple enough. Cisco Design and Implementation Guides (DIGs) can be found in the Cisco Design Zone. Many of these designs are Cisco Validated Designs (CVDs) that include […]