Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an acceptable IT cost structure is no small feat. Cisco joined forces with leading MDM vendors to link together a solution that starts at day zero – when an employee first buys a new device and tries to use it at work. It includes self-service onboarding to the network, offering a choice of using a device as a guest or work asset, and forced enrollment in (and compliance with) MDM when business policy must be enforced.
Citrix recently acquired Zenprise to add top-tier MDM to their mobile workspace and application management solution. The good news is Zenprise is an early MDM partner with Cisco, and Citrix inherits the integration work. The tight linkage of Cisco’s Unified Access Solution, and the Cisco Identity Services Engine, to what is now Citrix XenMobile MDM, is a powerful combination for customers to deploy since it brings quite a bit more to the table than standalone MDM.
This is our third preview of what Cisco will be showcasing at the 102nd National Retail Federation Convention and Expo on January 14 and 15, 2013 in New York City. We’ll be showcasing Cisco Bring-Your-Own-Device (BYOD) Smart Solution and see the technology that enables you to support mobile access that’s both easy and secure. Come learn how you can improve employee productivity and customer service with a highly secure BYOD environment. Please watch this video about the BYOD demonstration and then mark your calendar to join us at Cisco Booth #252 at NRF 2013. I look forward to seeing you there!
I attended MobileCon 2012, the newly branded CTIA enterprise and application event, earlier this month. I noticed the common theme this year was MDM-BYOD-Cybersecurity. Given the recent McKinsey report that indicated 77 percent of CIOs today state that they will allow some form of consumerization in the coming few years, IT professionals are challenged to increase flexibility without compromising security
Throughout the event, I heard many BYOD case studies with a huge interest/following in data and metrics. On this theme, I thought our own Cisco BYOD case study that we have been sharing with our customers would be of interest to this community.
Note, I will provide updated numbers soon as my peers continue to seek out the latest and greatest mobile devices here in the center of Silicon Valley.
A mobile paradox—huge growth and customer demand, yet significant business and market challenges—is causing many companies in the mobile value chain to question where the industry is heading. They’re struggling to understand the key drivers that will shape the industry and what this new world will mean for them in terms of new challenges and opportunities. Most of all, they want to know the winning strategies for achieving success in this New Mobile World Order.
A number of major disruptions, or strategic inflection points, in the mobile industry are radically altering the entire mobile ecosystem as we know it. Some of these disruptions have been slowly building up steam over the last couple of years, although many of these have just started and have yet to really play out. In the recently published white paper, “The New Mobile World Order: Perspectives on the Future of the Mobile industry,” Cisco IBSG identified eight strategic inflection points that are causing—and stand to cause even greater—disruption and uncertainty in the industry: Read More »
Millions consumers around the globe are buying smartphones, tablets, and other advanced mobile devices loaded with features and apps that can be used for business as well as for their own personal communication and entertainment needs. Many of these people have started taking these devices to work and integrating them into their daily workflow. This trend is often called “bring your own device,” or BYOD.
Cisco’s Internet Business Solutions Group (IBSG) wanted to know how prevalent BYOD is, and how corporate IT departments are handling these new devices in terms of support, network access, and security. In the spring of 2012, we surveyed 600 IT decision makers in U.S. enterprises, and then expanded our study in the summer of 2012 to include 4,900 IT decision makers in midsize companies and enterprises – in a total of nine countries.