Mobile Device Manager (MDM)
Cisco Meraki Systems Manager Extends Enterprise Mobility Management to the Cloud
1 min read
The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security...
The Continuum Approach for Secure Mobility
2 min read
A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your […]
What Next for BYOD?
2 min read
One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving. I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology. A great example of this has been the reaction to BYOD. The influx […]
Cisco ISE in the lab.
2 min read
My company is in the very early stages of an MDM BYOD project. As part of that we are looking at the Cisco Identity Service Engine (ISE) as a central piece. I am about half way through my testing and I thought that I would pass on some of what I have learned so far. […]
TMA? Get Some Relief from Acronym Overload
10 min read
I see and hear a variety of acronyms being used on a daily basis. I recently heard one tossed around with good humor that makes a point: TMA or Too Many Acronyms. Every once in a while, when I think I’ve embedded the definition and use of an acronym into my long-term memory (anything beyond […]
Identity and Device Aware IT Platforms Make Life Easier
3 min read
Life is generally a lot easier when you have all the facts. Especially if those facts are actually accurate. Nowhere does this ring more true than in the life of an IT professional. Often times a day in an IT shop is a lot like that grade school game of telephone where information gets passed […]
Have You Registered for Centralize Policy, Control and Enforcement May 15th?
1 min read
Activate the IT Transformation with Unified Access: Part 4 - Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register Now...
See How Organizations Use Cisco ISE to Centralize Policy and Secure Access
1 min read
Activate the IT Transformation with Unified Access: Part 4 - Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register...
MDM and Cisco’s ISE?
1 min read
Mobile Device Management or MDM is ideal for addressing many challenges inherent to our ‘Bring your own Device’ culture. MDM can help enforce policy for mobile devices but when you look closer, you begin to realize it does not solve everything. The challenge is when we ask our MDM technology to make policy decisions out […]