secure access

October 14, 2013

SECURITY

A Financial Service Organization Speaks Out on Secure Access

Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys…

August 27, 2013

NETWORKING

[Summary] How Secure Is Your Mobile Worker?

Let’s start with how well do you know your mobile worker?  Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage.  Cisco just released new global research (white paper) , Cisco Connected  World Intern…

August 22, 2013

SECURITY

How Secure is Your Mobile Worker?

How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World Internationa…

July 30, 2013

SECURITY

How Secure is Your Secure Access?

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?”  Fast forward to July, and I wish I had this SANS review on ISE to offer a month ea…

March 12, 2013

SECURITY

Securing Your Company’s Data in a Mobile World

Mobile workers accessing corporate applications and data from a range of personal and corporate devices is fast becoming the new normal. Month by month every survey confirms the inevitable—mixing personal and business data, devices, and apps. Companies are scrambling amidst a sea of new technologies…

February 19, 2013

NETWORKING

Demystifying the Catalyst: Cisco Context Aware Secure Access (Security Group Tags – SGT) Technology

In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources. Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your o…

December 11, 2012

SECURITY

The Power of Mobility & Learning

The mobility trend holds great promise for improved productivity and new engagement models. These are most powerful in a learning effort—imagine learning anywhere and anytime. I just wish I had the Internet and the mobility that students have today when I went to school. Yet, mobility is an IT tsuna…