Wireless and Mobility
Compliance versus Security
Rogue access points and unauthorized access, DDoS or penetration attacks, evil twin attacks – all mobile security issues that can keep you awake at night. But do you know the difference between compliance and enterprise security? Being compliant is not synonymous with being secure, that’s why our we…
Special Guest Post: Observations from Geneva Airport Passenger Terminal Expo
I’m standing here today in Geneva, at the annual Airport Passenger Terminal Expo, where Cisco and SITA are presenting our joint solution for WiFi-based location-based services in airports. This solution enables deep insights and understanding of how passengers use and move throughout their arrival…
Listen Up! Spotlight on NSA Show & Cisco Podcast Series
As some of you already know, we’ve teamed up with the popular wireless networking podcast “No Strings Attached” to release a mobility podcast series. We’ve recorded 6 podcasts, and counting! Enhancing Wireless with the MSE and WSSI (Listen to Podcast) For more on MSE For more on WSSI M…
Johnson City Schools Advance Wireless Network With Cisco BYOD Solutions for K12 Education
Cisco BYOD Solutions for K12 Education bring the freedom to learn anywhere, anytime while adding a dynamic, vivid component to education.…
Build Customer Loyalty, Boost Store Revenue
Do you want to increase sales by providing shoppers with the information they need when and where they need it – in your store? Cisco Connected Mobile Experiences solution can help you do just that. Connected Mobile Experiences is a new solution that helps enable retail organizations to use Wi-Fi lo…
MSE Blog Series Part 4: wIPS
To continue the MSE Blog Series, I’m going to take you on a journey to dig deep into one of the features of Release 7.4, wIPS! With the increasing popularity of BYOD, wireless security has become an eminent concern for Network Administrators. Cisco Unified Wireless Intrusion Prevention Solutio…
Looking Beyond the Mobile Phone
Why the Network Will Drive the Next Wave of Mobility Forty years ago, the first phone call was placed on a handheld mobile phone. The call was placed by Martin Cooper at Motorola’s Communications Systems Division, who phoned a competitor at Bell Labs—and launched a new era. The brick-like prototype…
Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]
Protecting Your Business in an “Any to Any” World Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we s…
Have you registered for Part 1 of “Activate the IT Transformation with Unified Access” Webinar Series?
This Wednesday, we’re kicking off a great webinar series that will walk you through the Cisco Unified Access solution. With the five-part series, we’re breaking down the one policy, one management, one network story into technical, informative chunks. Part 1 is in just two days, so if yo…