mobile security
Mobile Security: Actions Speak Louder than Words
3 min read
Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the […]
Summary: Navigating Security Threats in a Mobile World
1 min read
Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from....
Navigating Security Threats in a Mobile World
3 min read
Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from....
Summary: Tackling Mobile Security Risks for Government
1 min read
As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe...
Tackling Mobile Security Risks for Government
3 min read
"Cyber threats. Security breaches. Hacking." As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines...
Securing Cloud Transformation through Cisco Domain Ten Framework v2.0
3 min read
Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top concern for Security. With rise of applications, transactions and data in the Cloud, […]
Securing the Future Enterprise
3 min read
This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen...
Cybersecurity: Where are the Biggest Threats?
1 min read
Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as more and more information is collected and stored through the use of Internet-enabled devices.
Register to Learn About Cisco’s Policy Enforcement Solution
1 min read
In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release. During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest […]
1