Cisco Blogs

Securing Your Company’s Data in a Mobile World

- March 12, 2013 - 1 Comment

Mobile workers accessing corporate applications and data from a range of personal and corporate devices is fast becoming the new normal. Month by month every survey confirms the inevitable—mixing personal and business data, devices, and apps. Companies are scrambling amidst a sea of new technologies to regain control of their IT infrastructure, and those thinking ahead are planning for more than just tolerance of personal data and scaling mobile access; they’re building the next evolution of application access, which is based on consistent policies for application and data across any access method or device. These architectures demand an integrated system that spans device, network, and application layers, and they demand policies for employee access based on much more than user name and password. Throughout industries and their corporate infrastructures, I’m seeing a shift away from traditional device models and higher adoption of a more flexible and personalized bring-your-own-device (BYOD) policy in the workspace. But what does this mean for corporate data security? The Economist Intelligence Unit surveyed 578 global senior executives to discover current attitudes and approaches to today’s security challenges. Cisco’s recent infographic compiles the top insights from this report to help you understand the landscape, from how organizations are allowing data access to the top challenges identified by executives. Today, 76% of companies currently support a BYOD policy. Need to address security for proliferating personal devices in your workplace? Cisco’s Secure Access will help you build a foundation that connects people anytime, anywhere, using any device. To learn about Cisco’s Secure Access, visit:



Leave a comment

We'd love to hear from you! To earn points and badges for participating in the conversation, join Cisco Social Rewards. Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed.

All comments in this blog are held for moderation. Your comment will not display until it has been approved

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Anytime seamless and secure access to critical data/reports from the device of their choice has become very important necessity (not just expectation!) for timely decision making for 'C-level' and top executives. .... CIOs/CTOs must plan to update policies, standards, infrastructure and processes to support this new world necessity on priority; before their businesses start falling behind the competition due to lack of timely information availability to the decision makers. Comments welcome.