Keeping Schools Safe in a BYOD World

September 26, 2012 - 2 Comments

It’s no secret that when schools embrace technology, students and teachers win. The introduction of digital trends, like Bring Your Own Device (BYOD) and flipped classrooms, has engaged students and improved education. We’ve frequently referenced the success found at Katy Independent School District (KISD) with their BYOD strategy. After seeing how ingrained technology was in students’ day-to-day lives, Katy ISD launched a program that leveraged mobile devices as an educational tool. The resulting improvements in student engagement and test scores were so astounding that their strategy continues to be mirrored by schools nationwide!

However, in a BYOD world it’s even more important for schools to ensure that its infrastructure is not compromised by the mobile devices students bring into the network. IT departments are eager to implement security policies, like filtering search results and regulating network access, on all personal devices.  On top of that, schools need to continually comply with federal regulations that protect student privacy like the Children’s Internet Protection Act (CIPA).

Thankfully for IT professionals, Cisco understands the need for a network architecture that can grow to encompass a range of security challenges. From blocking malware and illegal sharing of copyrighted material to supporting BYOD programs and federal privacy standards, Cisco’s holistic approach solves the security needs of modern schools .

It is clear that technology is revolutionizing education and it shows no signs of slowing down. For IT professionals tasked with supporting the demands of modern learning now is the time to invest.


In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Some very good insight into the positive impact BYOD and Flipped Classrooms can have on learning outcomes as well as some of the challenges associated with those solutions. Clearly Security is top of mind.

    Cisco’s approach to its Security Practice is to follow a GRC model (Governance,Risk, and Compliance). IT GRC is a very big topic that applies to all aspects of information technology. Cisco focuses on bringing these concepts and techniques to allow the management of security as a business process.

    The approach first looks at the likelihood of outcomes and consequences, analyzed to improve security decision making. Are we meeting legal, regulatory, and reputational expectations? What risks do we have to be sure are addressed? What data is mission critical? Who should have access to it?

    THe next step is to build a Governance model, that is,the strategic management and measurement of the security program as a business process.Do we have a security strategy? Do we have a crisis plan in case something fails? Have we built a plan to address any risk/requrements we have identified?

    The last piece to this approach is Compliance. Do we have a plan and process to measure effectiveness empirically? Do we have demonstrated adherence to external as well as internal requirements for security behaviors and controls?
    Can we measure what we said we needed to implement?

    Cisco has a great professional services practice. They do take a holistic approach to build industry leading best practices.

    Pls let me or your Cisco Account Manager know if you would like more information.

  2. …Security is an important issue and Cisco’s holistic approach is keep god track to solve it…thanks for sharing this interesting keynote…