Mobile Device Manager (MDM)
Black Hat USA 2023 NOC: Network Assurance
The Black Hat Network Operations Center (NOC) provides a high security, high availability network in one of the most demanding environments in the world - the Black Hat event.
Black Hat Asia 2023 NOC: XDR (eXtended Detection and Response) in Action
For Black Hat Asia 2023, Cisco Secure was the official DNS and Malware Analysis Provider.
Black Hat Asia 2023 NOC: Connecting Singapore
Cisco Meraki is the Official Wired and Wireless Network Platform and Mobile Device Management Provider for Black Hat Asia.
Crossing the Chasm of Remote Access Doesn’t Have to Be Scary
Being tossed across the chasm of remote access and accelerated up the adoption curve doesn’t have to be scary. No one likes feeling a loss of control, but with ISE in place, you and your organization can gain the secure network access that we all need to do more than just survive.
Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2
This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered...
Advanced Mobile Malware Campaign in India uses Malicious MDM
Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled devices.
The Foundation for a Business Relevant Network
With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before. Back in June...
Cisco Meraki Systems Manager Extends Enterprise Mobility Management to the Cloud
The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security...
The Continuum Approach for Secure Mobility
A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your […]