Cisco Blogs


Cisco Blog > Mobility

A better understanding of BYOD without Compromise

As anyone who attended Cisco’s recent “BYOD without Compromise” Webinar noticed, the BYOD phenomenon is changing company priorities, and is bringing up a lot of questions about the solutions available to scale, secure and operate a successful  network. Replay the Webinar

Join us for our upcoming #ciscowifi TweetChat during which you’ll be able to engage in a real time BYOD discussion on Twitter with Cisco Technical Experts. What is a TweetChat?

April 17, 10-11am PST: TweetChat Topic: BYOD and Cisco ISE – use #ciscowifi.

First, I’ve put together just a few details based on the most popular questions posed during the recent webinar about Cisco’s approach to BYOD. And at the end of this post, I’ve also listed upcoming events for even more in depth technical discussions on a variety of BYOD topics.

Enhanced Identity Services Engine (ISE):

Cisco ISE is a context-aware, identity-based platform that gathers real-time information from the network, users, and devices. This enables IT to offer mobile business freedom with policy for when, where and how users may access the network..

ISE integrates with Prime Network Control System and supports BYOD with any 11n Wireless Access Point (even if you’re running your network in FlexConnect – aka HREAP- mode)

In addition to managing on-boarding, Cisco ISE has full guest lifecycle management.  It also allows IT to deny access to devices for a variety of reasons; such as who you are, what device it is, if you are running the latest OS or anti-malware or how you are accessing  the network..

Posture – Posture is the component of ISE platform responsible for enforcement of corporate security policies governing access to its enterprise network.  For example, for non-corp owned devices, you can decide what is the minimal requirements based on the device type/OS etc. Setting this up ahead of time will avoid security issues with non-supported devices

ISE also provides real-time endpoint scans based on policy to gain more relevant insight. These automated features result in a better user experience and more secure devices.  Cisco ISE uniquely leverages the network. It is essentially the brains for secure access and provides the policy to the network infrastructure (it is woven into the switches, routers, etc.)

New Prime Infrastructure:

Prime is a single package that provides complete infrastructure – wired and wireless, and mobility lifecycle management– configuration, monitoring, troubleshooting, remediation, and reporting.  This solution includes:  Prime Network Control System (NCS) for converged wired/wireless monitoring and troubleshooting, plus wireless lifecycle management, with new branch network management functionality; and Prime LAN Management Solution, for wired lifecycle management and Borderless Network services management.

Mobile Device Management (MDM):

To protect data on mobile devices and ensure compliance, Cisco is integrating with multiple Mobile Device Management vendors.  This gives IT greater visibility into the endpoint as well control over endpoint access based on the compliance of these devices to company policy (such as requiring pin lock or disallowing jailbroken devices), and the ability to do remote data wipes on lost or stolen mobile devices. If you don’t have a supported vendor, we will not be able to get as rich detail about the status of that device, however, you still get the full wired/wireless policy.

Current MDM third party vendors: Zenprise, Good, Airwatch, MobileIron

Device Operating Systems:

Wondering about which OS is preferred on your mobile device?

Cisco offers broad mobile device OS support in Cisco AnyConnect VPN software, including IOS, Android, and Windows Mobile.

Virtualization:

When it comes to virtualization, Cisco has created the Cisco Virtualization Experience Infrastructure (VXI), an end-to-end systems approach that delivers the next generation virtual workspace by unifying virtual desktops, voice, and video. Check out the link for more information on VXI, VXI with Citrix, VXI with VMware, Virtualization Services and validated Design Guides http://www.cisco.com/web/solutions/trends/virtualization/index.html

This is just a drop in the bucket. To get even more information on taking your organization beyond BYOD, don’t miss our upcoming technical deep dive webinars and in person events that speak directly to managing your growing network while you’re doing your best with limited resources.  You can also check out Cisco’s BYOD solution, Prime and ISE:

Upcoming Events

Tags: , , , , , ,

Policy Implications in the Rise of Mobile Broadband and Heterogenous Network Access

Over the last few months, a growing consensus has emerged pointing to a dramatic change in the way people access the Internet.

In 2011, for the first time ever, worldwide annual demand for smart phones surpassed that of PCs, laptops and tablets combined. Then last month our Mobile Visual Networking Index (VNI) Update reported that global mobile data traffic is growing even faster than previously forecasted and will increase 18-fold over the next five years.

So by this year’s Mobile World Congress in Barcelona in February, the ‘top of mind’ for network operators, government officials and device manufacturers was the dramatic accelerating impact that mobile data consumption will have on Internet access, networks and users.

When we launched the mobile VNI report on February 14, a panel of industry, academia and government experts glimpsed into the future of mobile broadband and related policy issues, with three key takeaways:

Read More »

Tags: , , , , , , , , , , , , ,

Bringing Wired and Wireless Broadband Together

By Howard Baldwin, Contributing Columnist

Wireless bandwidth has been on my mind a lot recently. Computerworld recently published my article, Wireless Bandwidth: Are We Running Out of Room?, which led to a stint on NPR’s “To The Point” on the topic. But until I tuned into one of the latest Broadband Breakfast presentations, The Wired Home and Wireless Policy – Convergence Legislation and Consumer Adoption, I didn’t realize that I’d been thinking about wireless in a way that technology people are supposed to avoid: in a silo.

Read More »

Tags: , , , , ,

How to Solve the Wireless Spectrum Puzzle

By Howard Baldwin, Contributing Columnist

An interesting battle over unlicensed wireless communication spectrum has been brewing in the U.S. over the last few weeks, one that pits advocates of open public access against advocates of licensing and private control.

Here are the highlights of the ongoing debate. In September, the FCC approved a spectrum test that could ultimately promulgate access using the white space between television channels. This method, known as “super Wi-Fi,” is said to allow the signal to travel further and still accommodate structural barriers. The test ran in Lake Mary, Fla., and concluded early in November. However, the FCC has not yet released results.

Read More »

Tags: , , , , , ,

A Vision of Interconnected Knowledge Societies

If you want to motivate people to break free from the current status-quo, then raising the bar of expectations — with a compelling vision, plus some bold goals and objectives — is certainly one approach to consider. The Broadband Commission for Digital Development has issued a challenge to world leaders, their top policymakers and other key stakeholders.

The following is their list of raised expectations:

Read More »

Tags: , , , , ,