By PowerBuy // 8 September 2015 // Related Categories: Tips
The rapid expansion of connected devices is a double-edged sword for businesses. On one hand, mobility, cloud, and BYOD innovations enable unprecedented flexibility, collaboration, and ease of access for employees. Fifty percent of employers will adopt BYOD policies by 2017, and 90 percent of American workers are already using their own smartphones for work. But this flexibility comes with a cost: as endpoints multiply, controlling network access becomes increasingly difficult. The vast majority – 90 percent – of organisations lack full awareness of all of the devices accessing their network. At the same time, insiders perpetrate 34 percent of all cybercrimes highlighting the key role of identity access management in maintaining a strong cybersecurity posture.
Cutting back on network access is not an option for companies trying to grow in today’s fast-evolving business climate. But managing the access control risks of expanded networks requires substantial financial and time investments in infrastructure and personnel to construct, support, and manage network access controls. Support and management can consume resources and prevent IT personnel from focusing on core IT security functions. And, most critically, solutions that do not scale with your business as it grows place more pressure on infrastructure, people, and time.
To help organisations combat barriers to owning a simultaneously secure and accessible network, we are unveiling Cisco Hosted Identity Services to provide growing businesses with flexible and scalable solutions for network access control. These services are designed to:
- Monitor network access
- Enforce context-aware and role-based identity access in accordance with company policy
- Enable secure connections on wired, wireless, and VPN connections across a range of devices
- Provide consistent and straightforward user experiences
Cisco Hosted Identity Services are hosted network access control services that provide context-aware identity enforcement by automating the management and permissions of user and device identity for access to an organisation’s network resources. This cloud-based subscription offering provides the full benefits of market-leading network access control capabilities with an enhanced user experience and flexibility to scale, equipping organisations with visibility and control across their networks. Cisco hosts and owns the entire solution, so clients receive the full benefits of Cisco Identity Services Engine (ISE) 24×7, including encrypted communications and context-awarene
 “Gartner Predicts by 2017, Half of Employers will Require Employees to Supply Their Own Device for Work Purposes.” Gartner. May 1, 2013. http://www.gart
“BYOD Insights 2013.” Cisco. 2013. http://www.cisc
 Galera, Bruno. “Emerging Trends for BYOD in 2014.” LERA Blog. 2014. http://lerablog
 “Key Findings from the 2013 US State of Cybercrime Survey.” PWC. June, 2013. Page 9. http://www.pwc.
Comments: 0 // Share: