Cisco Logo


Mobility

Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a work-life balance when my personal device is also my work device? Will my company support any device I choose?

Some of these questions might seem familiar as more business employees consider adding their own device to their company’s network. These questions also represent an important part of a comprehensive mobile strategy: User buy-in.

Brett Belding BYOD - without headerRecently, I read an interesting CIO article by Adam Bender that highlighted the importance of getting employees on board when implementing a BYOD policy. The article discusses that according to Frost & Sullivan analyst, Audrey William, many employees are worried that they won’t be able to control data on their device once they begin using it for work. In addition, William states that employees are also concerned about the lines blurring between work and play when both personas are merged onto one single device.

Although the concept of BYOD is not new, these concerns have important consequences in our networked world. So, what’s the answer?

An honest, safe, and secure MDM solution and effective policy communication.

Part of the BYOD privacy and security equation is enabling posture validation and access policy enforcement for mobile endpoints.

Integration between Cisco Identity Services Engine (ISE) and Mobile Device Management (MDM) platforms provides necessary insight into the posture of mobile devices so that IT managers can enforce appropriate network access policies. This type of honest, safe and secure solution can provide employees a stable solution and a consistent way of ensuring their devices are safe on the network, and vice versa.

Cisco ISE further extends the reach of current MDM solutions into network enforcement and provides consistent, unified policy for not just mobile devices but all networked devices.

It’s clear that armed with the right infrastructure, employers and employees concerns will be addressed by allowing the freedom to bring a device of choice of device to work while still allowing IT the control to ensure security and prevent data loss.

What questions do your employees have about your company’s BYOD policy? Let me know in the comment section below. And be sure to assess your company’s potential incremental value from implementing a BYOD policy more strategically.

Comments Are Closed

  1. Return to Countries/Regions
  2. Return to Home
  1. All Mobility
  2. All Security
  3. Return to Home