Cisco Blogs


Cisco Blog > Mobility

Honesty is the Best BYOD Policy

Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a work-life balance when my personal device is also my work device? Will my company support any device I choose?

Some of these questions might seem familiar as more business employees consider adding their own device to their company’s network. These questions also represent an important part of a comprehensive mobile strategy: User buy-in.

Brett Belding BYOD - without headerRecently, I read an interesting CIO article by Adam Bender that highlighted the importance of getting employees on board when implementing a BYOD policy. The article discusses that according to Frost & Sullivan analyst, Audrey William, many employees are worried that they won’t be able to control data on their device once they begin using it for work. In addition, William states that employees are also concerned about the lines blurring between work and play when both personas are merged onto one single device.

Although the concept of BYOD is not new, these concerns have important consequences in our networked world. So, what’s the answer?

An honest, safe, and secure MDM solution and effective policy communication. Read More »

Tags: , , , , , , , , , , , , , ,

Robot Soccer? Staying Connected at Bowdoin College

October 15, 2013 at 2:14 pm PST

As our team has prepared for Educause 2013 this week, we have been talking a lot about technology in higher education and how it’s impacting colleges, universities, students and staff. Of course, robot soccer was not the first thing that came to mind, but it’s a great example of how different technologies are changing education forever.

Bowdoin College, which you may remember from last year’s #1 Most Connected College, is one of my favorite case studies because it points out that people have to TRUST technology for it to really be effective. Trust is a big word, really – I know I’m not the only person who is a little gun shy when I think about updating my phone to a new software version. So, when a professor has a class full of students and says “let’s all stream this video right now”, it’s important that it actually works – or professors risk losing student attention, losing time and facing maximum frustration levels.

Read More »

Tags: , , , , , , , , , , ,

A Financial Service Organization Speaks Out on Secure Access

October 14, 2013 at 9:41 am PST

Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys ISE and AnyConnect with great success. Most recently coming from Gartner IT conference in FLA I had a chance to speak with other organizations that expressed secure access concerns. Read More »

Tags: , , , , , ,

More Effective Threat Visibility Using Identity and Device-Type Context

Following my previous blog post about identity and device aware IT platforms making IT operations easier and more effective, I wanted to delve a little deeper into a specific element of the IT infrastructure: Security Event & Information Management (SIEM) and Threat Defense (TD) systems.

Read More »

Tags: , , ,

Register to Learn About Cisco’s Policy Enforcement Solution

In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release.

During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors.Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.

Read more at http://blogs.cisco.com/borderless/ciscos-policy-enforcement-solution-delivers/

Already sold? Join us for the free webinar, Thursday Sept 5 at 10am PST to learn more.

Tags: , , , , , , , ,