The verdict is in — and it is all about security. Recent research from The Economist notes that security is the top concern for mobility and BYOD. Organizations want to embrace BYOD but want control to ensure secure access to the network. Chuck Robbins, Cisco Senior Vice President, wrote a blog entry that underscores what we hear almost daily in conversations with our customers and partners. The organizations we speak to have mobility policies that range from no personal devices allowed at all (which is really not BYOD), to policies that permit all personal devices with restricted access, and still others that allow all devices with differentiated access based on the device type, user, and posture.
Some common differentiation access use cases may include:
Allow my sales force to access the proposal portal remotely from their iPads but do not allow them access to the finance database.
Do not allow any jail broken device, whether personal or corporate-owned, because there is a high probability it has been infected with malware. A device is considered jail broken when the user gains root access to the operating system, allowing applications or extensions to be downloaded that are not available in the Apple Application store, which increases the risk of malware infection.
Automatically check to see if the device has pin-lock and disk encryption (basic device security), grant the device the appropriate access. If not, it will be diverted with the non-compliance explanation.
Another interesting observation is many of our higher education customers are starting to see eight devices per user versus the three devices noted. Watch out! The next workforce has some real potential to influence the new workplace.
Stay tuned -- later this year we look forward to sharing with you some further insight on mobile workers and their perceptions and behaviors regarding security. For example, how many folks download sensitive data on their personal smartphone? Or when an alert or pop-up warning occurs on their personal device what do they do? How many engage in risky behavior? Who is security aware? If you are a mobile device worker it would be great to hear your understanding of the security of your personal device in the new workplace.
Did I tell you that we have a contest currently underway? In case you missed it, you still have till midnight PST today to answer 5 easy questions with multiple choices. One correct answer makes you eligible to win an iPAD.
Questions this week are about Cisco ONE (Open Networking Environment ) -- Perfect timing as you are maybe preparing your participation to Openstack Summit (we do!) in San Diego. But even if you don’t plan to go, I am sure that you heard about SDN -- Haven’t you?
Think you know Cisco’s Unified Data Center? Like to friendly compete with others ? Well , well ! It’s about time to prove it! There are at least two ways to do that: the serious and the fun.
The Serious Way: You deploy an Unified Data Center at Work - Can it be risky? -- Not really ..but check out this video anyway:
Disclosure : The numbers displayed in this video are extracted from a real case study
The Fun Way: Participate to the Unified IQ Contest!
Starting on October 1st, we give you the opportunity to test your knowledge .
A fun and easy way to play and compete with an immediate reward. During 6 weeks , we will propose every week a set of questions with multiple choices created by our genius and facetious bloggers. We will cover topics such as Unified Computing Systems, Unified Fabric, Unified Management, Desktop Virtualization, Cloud, Open Network Environment. You got the picture! The whole Cisco Unified Data Center portfolio !
Sure, it’s not like the old days when summer meant no school and running around free, but like most people, summer still makes me feel like I have more personal time and freedom. It must be the extra daylight.
Even if I can’t have the feeling of summer, it makes a huge difference to me if I can work in different ways -- from home or even handling some to do items from the car.
One of the best things about the new, free version of WebEx, is that having a host account (yes, it’s free) means you can host a WebEx on your mobile. And that means I don’t have to be tethered to your computer.
Successful mobile workers tend to be resilient extroverts. They are open to new experiences and highly adaptable. And, contrary to the stereotype of the harassed and disoriented road warrior, they are supremely organized and independent-minded. With the right kind of tailored support, their productivity and adaptability make them superlative operators in an era of increasing demands and constant change.
In 2007, the Cisco study cited a prediction that “within two years, one quarter of the world’s working population will be mobile workers.” Not to freak anyone out but this was BEFORE Apple’s iPad was even released!
We’re in the midst of an incredible megatrend. We know it and we’re living it. We all love our mobile devices; whether it’s our laptop (yes, I’m sitting at my kids swim class typing away for work), our mobile phone (I’m getting texts on what’s for dinner), or our tablet (where Draw Something awaits me). Apple recently stated that they have sold more than 67 million iPads in the recent 18 months. That is more than all the Mac sales in the past 27 years. There’s no denying it: we are in the midst of an incredible megatrend—a mobile megatrend.
But what does this mean to businesses?From the IT perspective, the role of the mobile devices has transformed from a luxury item used for personal communication and entertainment to an integral tool for employee productivity. Mobile devices are now the main platform for work (laptop or tablet) and the primary medium for corporate contact (mobile phone). With employees bringing an average of two mobile devices each (laptop/tablet + mobile phone), companies can reap the benefits of new business opportunities and more productive employees.