Cisco Blogs

Cisco Blog > Mobility

With the Right Security Policy, BYOD Doesn’t Have to Be a Scary Thing

According the recent report by Cisco’s IBSG Group, the Financial Impact of BYOD, letting employees bring their own devices saves companies money and helps them become more productive. 53 percent of survey participants have raised work productivity through innovative work practices—powered by their devices. Nearly half of all participants preferred BYOD over corporate devices.

The freedom and productivity gains of BYOD are great for employees, but it also creates new priorities for IT—especially for security.  According to the BYOD and Mobility Security Report, security was a top concern for 70 percent of companies surveyed.

Just because employees are working on different devices doesn’t mean IT has to sacrifice security. The first step is in looking beyond the devices and putting together a mobility strategy. Cisco’s own mobility strategy is built around the network, not individual devices. It’s about viewing security as a way to allow individuals to work their way. Read More »

Tags: , , , , , ,

Register Now for ISTE 2013


The International Society for Technology in Education (ISTE) conference will take place in San Antonio, TX from June 23rd through June 26th.  ISTE is an annual conference providing hundreds of sessions, emerging education tech solutions, keynotes, face to face demonstrations and a collaboration of like-minded educators.  To register for this event please click here.

Join Cisco BYOD Solutions for K-12 Education will be featured along with Cisco Meraki Cloud Solutions in booth 11270 for live presentations and face to face time with knowledgeable experts discussing innovative technologies utilized in today’s classrooms.

Cisco BYOD Solutions for K-12 Education at booth 11270 will showcase four hosted demos: Read More »

Tags: , , , , , , , , , ,

Mark your calendars for 10AM PST June 5: Converged User Access Management Webinar

Don’t forget: this Wednesday at 10AM PST we’re having the last of our Activate the IT Transformation with Unified Access webinar series: Converged User Access Management.

Register today and mark you calendars for this informational deep dive into Prime Infrastructure 2.0 and learn how it integrates into Unified Access for one management across one converged network with one singular policy. CLICK HERE TO REGISTER

Tags: , , , , , , ,

[Cross-Post] Is Your Company Achieving the Full Value of BYOD?

Robert Metcalfe popularized the idea of the “network effect,” where the value of a network grows exponentially in proportion to the number of users and things on that network. Many people these days wonder if this principle applies to the “bring your own device” (BYOD) trend—where the complexity of all the devices, software, and standards that must be accommodated may cause some IT leaders to question whether the promised value is worth the headache.

Certainly there’s potential for tremendous value: the most recent report from Cisco Consulting Services onthe Financial Impact of BYOD reveals that with the right approach to implementation, companies across the globe could be generating an average annual value of $1,650 per mobile user. In the United States, than number grows to $3,150.

So, how can you know whether or not you are realizing the full potential of BYOD in your company? And more important, how can you progress from wherever you currently are along the value journey to where you want to be?

Read more at The Platform Blog

Tags: , , , , , , ,

Get Converged User Access Management

Cisco Prime Infrastructure is a network management tool that helps accelerate the rollout of new services. It also provides highly secure access and management of mobile devices, making bring- your-own-device (BYOD) access a reality for corporate IT. Tightly coupling client awareness with application performance visibility and network control, Cisco Prime Infrastructure helps ensure an uncompromised end-user experience. Deep integration with the Cisco Identity Services Engine (ISE) further extends this visibility across security and policy-related problems. It presents a complete view of client access issues with a clear path to solving them.

Whether you are well-versed with Prime Infrastructure and want a sneak peek at Prime Infrastructure 2.0 (yes, 2.0) OR you’re new to Cisco’s network management suite and just want to feel out the options, join us at our webinar June 5th (Click to Register) to learn about how Unified Access streamlines converged user access management. We have lined up an early preview of the latest Cisco Prime Infrastructure that we’ll showcase in action with a live demonstration.  Read More »

Tags: , , , , , , , ,