mobile security

April 24, 2014

SECURITY

Mobile Security: Actions Speak Louder than Words

Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author D…

March 18, 2014

NETWORKING

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial. Business decision-makers must gain insight into w…

March 14, 2014

SECURITY

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial. Since mobility solutions offer users the ability…

February 12, 2014

SECURITY

Summary: Tackling Mobile Security Risks for Government

As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures. A few weeks ago, Cisco and Mobi…

February 11, 2014

EXECUTIVE PLATFORM

Tackling Mobile Security Risks for Government

“Cyber threats. Security breaches. Hacking.” As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enable…

January 31, 2014

DATA CENTER

Securing Cloud Transformation through Cisco Domain Ten Framework v2.0

Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top conc…

January 17, 2014

SECURITY

Securing the Future Enterprise

This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen Wi-Fi models will pave the way for secure mobility. The second post highlights the risks versus t…

November 13, 2013

SECURITY

Cybersecurity: Where are the Biggest Threats?

Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as m…

September 3, 2013

NETWORKING

Register to Learn About Cisco’s Policy Enforcement Solution

In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release. During this free event, you will learn…