Cisco Logo


So you think you know what BYOD is? Think again!

Cisco Cius - Not BYOD since it's Corporate provisioned.

If you’re a manufacturer you’ve probably heard of BYOD, or ‘Bring Your Own Device’.  You know that more and more devices are proliferating throughout the organization. You also know that security is a big issue: How do you stop folks accessing sensitive systems, how do you protect Intellectual Property, and how do you prevent a disastrous shutdown caused by a device either intentionally or unintentionally?

Well, these are only some of the issues -- and they’re rarely addressed by a ‘Good-Enough Network’. Cisco’s BYOD is different -- it looks at the whole picture. It’s not just about your wireless network -- although the Cisco offerings are better than most! It’s about an holistic approach to BYOD. That covers the plant, IT, the LAN and fixed wired network and the wireless network too. All aspects.

As my colleague, Katie Taylor, says in her blog:

Bottom line, the rules of the game are changing, and companies must move beyond basic BYOD connectivity to meet employee demands today and tomorrow. To help companies meet these demands, we’ve introduced a comprehensive approach that unifies policy, supports a better user experience and simplifies management to deliver an uncompromised user experience in any workspace. After all, Cisco wants to empower IT managers to allow employees to have their devices and use them too. That means delivering:

  • A unified security policy across the whole organization – wired, wireless, VPN and now MDM* – helping companies set and enforce policies;
  • An uncompromised user experience over the entire wired/wireless network, across any type of device and,
  • Simplified operations and network management to understand application performance from a user’s perspective, accelerating troubleshooting and lowering operating costs.

Why is this happening? Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco® Connected World Technology Report found that more than 40 percent of college students and young employees said they would accept a lower-paying job that had more flexibility with regard to device choice and mobility than a higher-paying job with less flexibility.

Let’s come back to that technology angle. Cisco has really taken the lead here with enhancements that sets it apart from the competition:


In an effort to keep conversations fresh, Cisco Blogs closes comments after 90 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Andrew Iacobelli

    This last segment of the blog is supported with data from this survey– “Cisco® Connected World Technology Report found that more than 40 percent of college students and young employees said they would accept a lower-paying job…..” and the strength of this data is very subject to debate. Surveys and College graduate trends can be strong tools to lead us into the future but most people who need to work will say one thing but do another. “FUN” systems will not pay the rent but there is no dispute that employee satisfaction drives long term stability and productivity. Cisco will need to follow these trends closer than many companies since they have a large presence in the Valley. On the other hand, companies venturing into these waters in many parts of this global world better be sure they have tightened security and the enormous resources needed to control this BYOD trend. Controls, security and the cost of many platforms & software models may be a large drain for many smaller businesses. Most companies, even internet start-up businesses need to be sure they are in control of their data and systems before they add too many bell and whistles to their “FUN INDEX” at work.

    I believe we need to look at this problem in the same way we should be looking at the risk indexes of any business opportunity. We need a solid risk matrix that defines how we allocate resources towards meeting these BYOD objectives. We need to break down access to certain areas and systems connections based on the risks associated with the work area. Separate access points should be maintained for different business risks. In other words, keep all IP, financial data and key business data (Employee names, SS# & compensation data) out of harms way using core system security backed up by segregation of physical systems. This way we will not spend millions undoing a security disaster or a competitive IP breach.


    • Peter Granger
      Peter Granger

      Thanks for your insight Andrew – much appreciated. I can tell you that my own experience with the ‘millenniums’ as we seem to be calling them, is that they really do seem to value the technology tools to help them get the job done. There’s debate as to their motives – maybe facebook/IM availability at the same time as doing their day job is the incentive, I don’t know. It probably started with the baby boomers, but now work and play seem intertwined and connected. We all like working at home, but we probably work more hours than we used to because of that!

      I agree with your analysis concerning security – top of mind for Cisco and our customers – and a key differentiator in the market.

      Thanks for you comments – we value this kind of serious analysis.



Trackbacks and Pingbacks:

  1. Return to Countries/Regions
  2. Return to Home
  1. All Manufacturing
  2. All Security
  3. Return to Home