Cisco Blogs


Cisco Blog > Security

Securing Your Company’s Data in a Mobile World

Mobile workers accessing corporate applications and data from a range of personal and corporate devices is fast becoming the new normal. Month by month every survey confirms the inevitable—mixing personal and business data, devices, and apps. Companies are scrambling amidst a sea of new technologies to regain control of their IT infrastructure, and those thinking ahead are planning for more than just tolerance of personal data and scaling mobile access; they’re building the next evolution of application access, which is based on consistent policies for application and data across any access method or device. These architectures demand an integrated system that spans device, network, and application layers, and they demand policies for employee access based on much more than user name and password. Throughout industries and their corporate infrastructures, I’m seeing a shift away from traditional device models and higher adoption of a more flexible and personalized bring-your-own-device (BYOD) policy in the workspace. But what does this mean for corporate data security? The Economist Intelligence Unit surveyed 578 global senior executives to discover current attitudes and approaches to today’s security challenges. Cisco’s recent infographic compiles the top insights from this report to help you understand the landscape, from how organizations are allowing data access to the top challenges identified by executives. Today, 76% of companies currently support a BYOD policy. Need to address security for proliferating personal devices in your workplace? Cisco’s Secure Access will help you build a foundation that connects people anytime, anywhere, using any device. To learn about Cisco’s Secure Access, visit: http://www.cisco.com/en/US/netsol/ns1204/index.html#~Overview

EIU_20121

Tags: , , , , , ,

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.

1 Comments.


  1. March 16, 2013 at 8:28 am

    Anytime seamless and secure access to critical data/reports from the device of their choice has become very important necessity (not just expectation!) for timely decision making for ‘C-level’ and top executives. …. CIOs/CTOs must plan to update policies, standards, infrastructure and processes to support this new world necessity on priority; before their businesses start falling behind the competition due to lack of timely information availability to the decision makers.

    Comments welcome.

       0 likes