#Security
Going Mobile? Get Secure.
There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for m…
Cisco Live! Milan Session Videos and Documents Now Available!
If you were unable to attend Cisco Live! Milan, or weren’t able to attend all the sessions that interested you, Cisco has made the session videos and PDFs available on the Cisco Live! website. More videos are being added daily and all should be available by February 22, 2014. The Cisco Live! w…
Summary: Tackling Mobile Security Risks for Government
As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures. A few weeks ago, Cisco and Mobi…
Tackling Mobile Security Risks for Government
“Cyber threats. Security breaches. Hacking.” As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enable…
Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5
If you’ve worked on a K-12 wireless network, you’ll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even higher demands on a high quality, high performing network. What exactly needs to be taken into consideration when de…
Is Your K-12 Network Ready for Common Core Standards?
What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to sup…
A Balanced Approach to Mobile Security
Gartner recently made three interesting predictions about mobility in the workplace. While the ideas are compelling, they only offer one-side of the story, and the solution. In this blog post, I’ll take a deeper look at each of these predictions and discuss why the future of mobility rests on IT lea…
What Next for BYOD?
One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving. I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology. A great example of this has been the reaction to…
Securing the Future Enterprise
This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen Wi-Fi models will pave the way for secure mobility. The second post highlights the risks versus t…
2