I attended MobileCon 2012, the newly branded CTIA enterprise and application event, earlier this month. I noticed the common theme this year was MDM-BYOD-Cybersecurity. Given the recent McKinsey report that indicated 77 percent of CIOs today state that they will allow some form of consumerization in the coming few years, IT professionals are challenged to increase flexibility without compromising security
Throughout the event, I heard many BYOD case studies with a huge interest/following in data and metrics. On this theme, I thought our own Cisco BYOD case study that we have been sharing with our customers would be of interest to this community.
Note, I will provide updated numbers soon as my peers continue to seek out the latest and greatest mobile devices here in the center of Silicon Valley.
For Cybersecurity, I’d like to follow up on John Stewart’s thoughts from yesterday. October is National Cybersecurity Awareness Month, and the joint-task theme between public and private industries resonated across the show. On this note, Cisco is one of the contributors in CTIA’s recently released Cybersecurity Whitepaper.
In my next few blogs, I want to share interesting facts I’m calling, “Did U Know Data for Mobile Security.” The first fact comes from Osterman Research, Inc. for Azaleos.
“The leading factor (34%) cited for deploying an MDM solution was the potential for loss of intellectual property.”
Tags: bring your own device, byod, cyber, cybersecurity, MDM, Mobile Device Management, mobile devices, mobilecon, STIA
The verdict is in — and it is all about security. Recent research from The Economist notes that security is the top concern for mobility and BYOD. Organizations want to embrace BYOD but want control to ensure secure access to the network. Chuck Robbins, Cisco Senior Vice President, wrote a blog entry that underscores what we hear almost daily in conversations with our customers and partners. The organizations we speak to have mobility policies that range from no personal devices allowed at all (which is really not BYOD), to policies that permit all personal devices with restricted access, and still others that allow all devices with differentiated access based on the device type, user, and posture.
Some common differentiation access use cases may include:
- Allow my sales force to access the proposal portal remotely from their iPads but do not allow them access to the finance database.
- Do not allow any jail broken device, whether personal or corporate-owned, because there is a high probability it has been infected with malware. A device is considered jail broken when the user gains root access to the operating system, allowing applications or extensions to be downloaded that are not available in the Apple Application store, which increases the risk of malware infection.
- Automatically check to see if the device has pin-lock and disk encryption (basic device security), grant the device the appropriate access. If not, it will be diverted with the non-compliance explanation.
Another interesting observation is many of our higher education customers are starting to see eight devices per user versus the three devices noted. Watch out! The next workforce has some real potential to influence the new workplace.
To help organizations get ready for securing BYOD, we have a paper on Readiness Assessments: Vital to Secure Mobility; check it out.
Stay tuned – later this year we look forward to sharing with you some further insight on mobile workers and their perceptions and behaviors regarding security. For example, how many folks download sensitive data on their personal smartphone? Or when an alert or pop-up warning occurs on their personal device what do they do? How many engage in risky behavior? Who is security aware? If you are a mobile device worker it would be great to hear your understanding of the security of your personal device in the new workplace.
Tags: bring your own device, byod, iPad, malware, mobile device
Talking with customers in various segments, one common trend seems to be emerging for branch deployments: customers are trying to strike the right balance between 2 opposite ideals. On one side they want to deliver great user experience and drive employee productivity but on the other side they are being asked to reduce cost and operate more efficiently. It is becoming increasing challenging to strike this right balance, especially with newer technologies like virtualization, BYOD and Cloud.
Read More »
Tags: ASR1K, byod, cloud, CSR1000v, ISR G2, strategy, virtualization
On my way to the airport this last week I heard about a new study that came out finding over half of all Americans now carry a tablet or smartphone. This little stat reminded me of the second scariest holidays of the year, after Halloween, of course.
With the approach of Halloween we can start getting ready (at least in some countries) for running the five month holiday gauntlet. With Halloween we can get giddy on candy and fright, for Thanksgiving we can stuff ourselves with family and food, and this is all preparation for the biggest consumptive month of December stuffed with Christmas, Hanukkah, and New Year’s (and other holidays I haven’t thought of) and we’re afflicted with the fever of conspicuous giving. In January many get a rest as they reset, try new diet and exercise programs, and then gear up for Valentines. However, IT folks get a very special January holiday, Byodday. Read More »
Tags: byod, cisco byod, Cisco Roadshow, Cisco Unified Access, new tablets, unified access
Want to know how to make sure your network is secure & meets compliance all while enabling a successful BYOD program?
OK, I admit that I’ve always been a techie wannabe, however I never quite made it to true techie level. So when the buzz around BYOD and unified workspace started a couple years ago, I was intrigued, and as it has built momentum and taken hold in so many organizations, I have taken an interest in understanding how it really works. Obviously, security, visibility and control are the big concerns, and to understand how those concerns are met, I found this video on Cisco’s Identity Services Engine (ISE) really helpful:
Read More »
Tags: byod, c21gov, edtech, govtech, mlearning, Techwise TV, unified workspace