Editor’s Note: This post is a response to EN Mobility Workspace. Please see that post for full context.
A colleague of mine here at Cisco, Jonathan, recently spoke well to the Evolution of Cisco Mobility Workspace Journey. Like all technologies, there is an adoption and engagement cycle based on maturity and risk level. We begin at the device-focused phase with a simple “get me on the network.” Following is the application-focused phase, “now that I am on what can I do with my ability to move around without a wire and work anytime and anywhere.” And the final is the overall experience, which is tailored to the user based on who they are, where they are, what they need or can do. And one can argue the next mobility phase for organizations is IoT (Internet of Things) as more single purpose devices (not necessarily with a user behind it) move to the wireless network.
What is critical to point out is the consistent requirement (not a nice to have) for security as the mobile user experience expands. Why is this so important? According to IDC over 47 percent of organizations see security enhancements required with their mobility initiative. The questions to consider are:
- What are the secure mobility issues today and potentially tomorrow?
- What are the implications?
- What is likelihood of these threats?
The top secure mobility concerns noted by numerous surveys indicate the following:
- Data protection
- Application access
- Lost and stolen device
- Rogue devices
Read More »
Tags: application access, cyber security, data protection, interop, lost device, mobile, MobileIron, Ponemon, rogue device, security, stolen device
MDM Today and the Future
Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increasingly being forced to accommodate for business use. This is not new news. We observe this pattern through our customers today and live this phenomenon within our own everyday work environment at Cisco. Here at Cisco, employees have the flexibility to choose their device and to securely connect to voice, video and data services from anywhere under an Any Device policy. Cisco manages over 64,000 mobile devices today.
Read More »
Tags: AirWatch, byod, citrix, good, MDM, meraki, Mobile Device Management, mobile security, MobileIron, mobility, SAP Fiberlink, security
When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First and foremost for IT organizations was gaining visibility to all mobile devices — rogue or authorized — that were present on the wireless network. Cisco ISE delivered that capability, providing IT staff with a detailed view of what types of mobile devices were on the network. Coupling that with ISE’s native BYOD enrollment capabilities or the active management capabilities of MDM platforms — as well as network intelligence from the Cisco Wireless Network — was key to gaining full control over this Wild West of mobile devices
Read More »
Tags: AirWatch, byod, Citrix (Zenprise), Fiberlink, Good technology, Identify Service Engine, ISE, MAM, MCMS, MDM, MobileIron, mobility, SAP Afaria, secure BYOD, security