authentication

January 17, 2014

NETWORKING

What Next for BYOD?

One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving.  I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology.  A great example of this has been the reaction to…

October 17, 2013

PERSPECTIVES

Check Ins – Why location needs to be part of Authentication and Identity

Dude, where’s my IP? I love to check in on social networks like Foursquare and Google+. Most of the time, there’s no point to it, but it’s fun to see what friends and colleagues are up to or discover new local haunts. Despite the fun and games, location is much more important to the network than it…

May 12, 2013

NETWORKING

Have You Registered for Centralize Policy, Control and Enforcement May 15th?

Activate the IT Transformation with Unified Access: Part 4 –  Centralized Policy, Control, and Enforcement  Wednesday, May 15, 2013  10am-11am PDT     |       Register Now Don’t miss the next in line of our five-part Unified Access Webinar Series  on May 15th to hear how organizations in…

May 9, 2013

NETWORKING

See How Organizations Use Cisco ISE to Centralize Policy and Secure Access

Activate the IT Transformation with Unified Access: Part 4 –  Centralized Policy, Control, and Enforcement  Wednesday, May 15, 2013  10am-11am PDT     |       Register Now With more users and devices being added to your network every day, unified access and central policy control have become c…