Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Network Centric World. Rick Graziani Networks in the way we work Networks are no longer just a luxury, but a necessity in conducting.
New Technologies & Solutions in Humanitarian Emergency Response.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Cisco Systems IP Interoperability and Collaboration System (IPICS) Rick Santina.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Information Security Information Technology and Computing Services Information Technology and Computing Services
Motorola’s ASTRO 25 IP Platform
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
Lecture 4: Mobile Computing
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Guerilla Warfare Balakumar Balasubramanian. Security Issues In Wireless/Mobile Networking.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
BUSINESS B1 Information Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Dell Connected Security Solutions Simplify & unify.
Chapter 7 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Networks, Telecommunications, and Mobile Technology.
Exploring the Network.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Specification section 6.2. What do you need to learn? The application and advantages/disadvantages of the following digital media and new technology in.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Extending the Value Chain into the Customer’s Home Connections 2004 May 7, 2004.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
George L. Heron Technology Officer, SafeNet, Inc..
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
Using Technology to Manage Information
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
IS Network and Telecommunications Risks Chapter Six.
InterManager 13 Oct Challenges in Managing Ship Communications.
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 1.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 1: Explore the Network
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
User and Device Management
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Networks Unit 5 Digital Literacy Computer Technology (S3 Obj 2-1, 2-2 & 2-3)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Chapter 1: Explore the Network
Indiana Department of Health
Providing Teleworker Services
Presentation transcript:

Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009

The Mobile Workforce Teleworkers Field Personnel- Public Works, Inspection, Engineers, Technicians Travelers Public Safety- Fire, Police, EMS

Four Primary Components Power Hardware/Software Connectivity/Communication Security

Laptops, PC’s and PDA’s Notebooks/Netbooks and Home Workstations Handhelds, Cellphones Specialty Devices- Meter Readers, Ticket Writers

Wireless Communications Data Cards City Wide Wireless- Mesh, Canopy, Access Points Radio Frequency Satellite Cellphones Softphones Radio’s Video Transmissions Live Meetings/Webex

Security Hardware/Software Firewalls Anti-virus and spam VPN’s Two Factor Authentication

Top Security Challenges Some of the most important security challenges facing organizations today include Data protection Vulnerability security Policy and regulatory compliance Identity theft and leakage of information Viruses and worms Risk management Access control User education, training and awareness Wireless infrastructure security Internal network security / insider threats Increasing sophistication of attacks and complexity of security management will demand more integrated / proactive security solutions.

Mobility in it’s simplest form Assumptions that this is complete

The Mobile Office

Squad Car Portfolio MDT and Peripherals Connectivity VPN Wireless Router and Access point Security and Authentication Position (GPS)

The Future Convergence and Consolidation Consoles- F4W, Cisco Virtual Office Hardware- PDA’s & Smart Phones Software Apps- Interoperable Communications, Agency Specific Platforms Voice & Data- Increased Coverage & Bandwidth

All in one consoles Data, Voice, Video, IM and specialty Apps in one view. Group alerts Customizable windows

Packing Power in Small Packages

Models for Agency Networking Social Networking Sites: –Facebook, MySpace, Twitter, –Instant Messaging, LinkedIn

Targeted and Mass Communications Designed for mass notification Excellent for groups- Public Safety, First Responders, Critical Personnel

Discussion Rob Cooper Acct. Exec State and Local Thank You!