The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.
We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.
It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution. The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).
Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.
For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.
Tags: 3rd party, access point, AirWatch, API, App, application, byod, citrix, connect, content, customer, device, emm, Enterprise, Identity Services Engine, infrastructure, ISE, Manage, management, market, MDM, meraki, mobile, mobile device, MobileIron, mobility, network, partner, policy, portfolio, secure, security, solution, system, systems manager, trend, vendor, wi-fi, wifi, wireless
As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX) solution, so we wanted to clear this up for our customers.
What does this mean for you?
First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:
1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.
2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app
3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps
4. Opt Out: End-users are always presented with the option to opt out of location-based services
The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.
What does this mean for our CMX value proposition? Read More »
Tags: address, aggregate, analysis, analytics, App, Apple, application, Cisco, cmx, connect, consumer, customer, data, download, engage, experience, IOS, ios 8, ios8, lbs, location, location based services, location-based, login, mac, mac address, market, meraki, mobility services engine, mse, network, onboard, permission, Presence, privacy, probe, probe request, services, trend, value, value proposition, wi-fi, wifi, wireless
Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be among the largest and most prestigious public universities in Germany serving over 25,000 students per year. It is the alma-mater to many world-wide leaders from Nobel prize winners, a CEO of a fortune 500 company, a president of a country and multiple World Robocup champions.
No wonder, they have a reference from Albert Einstein!
In 2009 TU Darmstadt embraced BYOD with the 5508 Series Controller managing the 1140 802.11n Access Points. Recently we talked to Thomas Vogel, the Head of Network Group and Andreas Liebe, the Network Services Manager who have over 15 years of experience managing WLAN environments. In this blog, we will describe some of the details of WLAN deployments using the 3850 Series Switch and the 5760 Series Wireless LAN Controller to address the new requirements in the school environment. Read More »
Tags: 3850, 5760, 802.11, 802.11ac, 802.11n, access, access point, account, AP, App, application, authorized, AVC, bring your own device, buildings, byod, Cisco, client, controller, Converged Access, darmstadt, deployment, devices, employee, encrypted traffic, environment, frankfurt, Germany, infrastructure, IPv6, LAN, management, network, policy, prime, Prime Infrastructure, requirements, research, school, security, services, standard, switch, technische, technology, trend, TU, TUD, unified access, Universität, university, user, visualize, wi-fi, wifi, wired, wireless, wlan
The times keep changing: first there were devices, then there were apps, and today, if you don’t develop a strategy for enterprise mobility and get ahead of the trend, the mobile wave will leave you behind. A year ago, after talking with many of our customers, partners, and our own technical sales teams, we realized that IT organizations were facing enormous challenges when making the transition from simple BYOD to adopting an enterprise mobility strategy across the business. As is typical during such tremendous market transitions like mobility, IT organizations were spending a lot of time figuring out how to line up the pieces required to support a mobile workforce, sorting through and weighing the many technology and vendor choices.
Today in conjunction with our friends at Citrix, we are happy to highlight the Cisco Mobile Workspace Solution with Citrix, built on the Citrix Workspace Suite. We are very excited to deliver this first of its kind, comprehensive solution to our customers. Today I’d like to take a step back and set the stage for the Cisco Mobile Workspace Solution with Citrix by taking you through our thought process in creating the right enterprise mobility solution for our customers. Read More »
Tags: ACI, App, byod, Cisco Validated Design, citrix, Citrix Workspace Suite, Complexity, customer, device, Enterprise, experience, mobile, mobile workspace, mobility, sales, secure, security, technology, trend, wifi, wireless
It’s exciting to watch the explosive growth of mobile and hyper local based services. Mobile location based services and marketing is rapidly becoming BIG business, with an estimated $4.5B of mobile advertising being location based (rising to over $10B by 2017).
Let’s look at some of the fundamental factors, drivers and numbers behind this growth to put it into context. Read More »
Tags: advertising, analytics, attribution, best practice, click attribution, consume, content, context, conversation, crm, customer, digital, engagement, Industry, location, location-based, marketing, mobile, mobility, model, multi-channel, network, omni-channel, purchasing, relationship, ROI, sales, services, technology, trend, wi-fi, wifi, wireless