With more than seven billion souls set to tote 10 billion mobile-connected devices by 2016, mobility has not just arrived, it’s taken over our schools, businesses and personal lives.
Just ask Mitch Davis, the CIO of Bowdoin College, a private liberal arts college in Maine. Before BYOD ever became a global IT trend, according to Mitch, the vast majority of college students were already bringing their personal devices into the campus environment.
These co-eds expected Bowdoin to fully embrace personal mobility, and, upon graduation, these same post-grads expect that their employers will do the same (this year’s Connected World Technology Report findings back this up, with more than 40 percent of recent college graduates/Gen Y employees choosing BYOD flexibility over higher pay).
Bottom line, the rules of the game are changing, and companies must move beyond basic BYOD connectivity to meet employee demands today and tomorrow. To help companies meet these demands, we’ve introduced a comprehensive approach that unifies policy, supports a better user experience and simplifies management to deliver an uncompromised user experience in any workspace. After all, Cisco wants to empower IT managers to allow employees to have their devices and use them too. That means delivering:
- A unified security policy across the whole organization – wired, wireless, VPN and now MDM – helping companies set and enforce policies;
- An uncompromised user experience over the entire wired/wireless network, across any type of device; and,
- Simplified operations and network management to understand application performance from a user’s perspective, accelerating troubleshooting and lowering operating costs.
Like Ray-Ban aviators, BYOD is here to stay. And done the right way, BYOD demands a comprehensive approach to allow current and future employees to work how they want, when and where they want, and on the devices they want – while still allowing IT the control and visibility to sleep at night.
Learn more about our announcement and new technologies here.
By the way, whether you’re a college student or have been working for 30 years, you’re eligible to take the BYOD Challenge and win a trip to 2012 London Olympics – good luck!
Tags: access point, beyond byod, bring your own device, Bring your Own Device (BYOD), byod, CIO, enterprise mobility, MDM, Mobile Device Management, mobile devices, network management, vpn, wi-fi, wifi, wireless access points, wireless LAN, wlan
In a previous blog, I posted the first of three pitfalls of hitching your wagon to the cloud . Today, let’s cover the second pitfall of force fitting cloud into your current security model.
Recently, I had an opportunity to listen to the CIO of a Fortune 100 company talk about top business care-abouts for IT. We have all heard about cloud and virtualization as technology care-abouts, but this CIO boiled it all down to two things that matter for IT: Productivity and Risk. Read More »
Tags: ASR_1000, CIO, cloud, Hybrid Cloud, ISRG2, IT, risk, security, vpn, WAN
I have a confession: I’m a technology late-adopter. On Rogers’ Innovation Adoption bell curve, I probably fall somewhere in the ‘late majority’ — I like the tried and true.
But with a few years and many advances, I’m back on Facebook (my short experience with it left me with privacy paranoia), and if you can believe it, I’m now an iPhone user. I appreciate not lugging around my iPod, and having a camera ready whenever I need it, but it’s not only the extra bells on the integrated device that has impressed me -- it’s the realization that I don’t have to compromise functionality to have it all.
Another technology that has made a lot of strides since its entry into the market is integrated router security. Read More »
Tags: access control, asr 1000, Cisco ISR G2, firewall, security, TrustSec, vpn, VPN routing/forwarding, WAN
Do you think hybrid clouds look like your granny’s network too? Well, that may be extreme, but there is no doubt that hybrid clouds are networked in ways we saw things connected a decade back. Consider a recent example I came across while discussing cloud adoption at a large global enterprise headquartered in the US. Their Asia office wanted to deploy a regional application for local use. It was impractical to deploy it at one of the two large data centers in the US since user experience would be sub-optimal due to latency issues. Hence they chose a local cloud provider to host the application. Sort of a hybrid cloud situation. So what? Read More »
Tags: asr 1000, cloud, cloud connect, cloud intelligent, hybrid clouds, ISR G2, Network design, routing, Virtual Private Clouds, vpn
In the second installment of our Valley Sleep Center case study, we witness the importance of installing a robust, secure virtual private network (VPN). As a medical clinic, Valley Sleep Center needs to maintain HIPAA compliance and also allow employees to review confidential patient records. Overhauling its antiquated VPN technology, the company implemented a high-performance Cisco VPN solution. Now, employees have reliable connections and can efficiently transfer files among the business’s five locations. Perhaps the best benefit, however, is the peace of mind that comes from the security provided by the right network.
Part One of the Valley Sleep Center
Watch Part Two>>
Read More »
Tags: Cisco, Invision Technology Solutions, right network, savings, sleep clinic, UC, Valley Sleep Center, vpn