Cisco Blogs

Tablets Welcomed: How Cisco IT created a mobile access policy for any device

July 11, 2011 - 5 Comments

Hope you found last week’s inaugural blog on the “Tablet Welcomed.” series interesting enough to come back.

Today, I am sitting down for an interview with Brett Belding, who was instrumental in designing a mobile device access policy for Cisco, in his role as the Senior Manager of IT.

I met Brett over Cisco Telepresence one early morning (when I typically I am still asleep, let alone in the office) to accommodate his Eastern time zone schedule. For the videophile readers, I should say that I pointed my camera directly to the Telepresence screen, which is why you may notice my reflection at certain points. However, this amateur video alone could be a case study for the quality of Cisco Telepresence.

Brett, started thinking about BYOD, long before the term was coined and long before tablets. In fact, the mobile device access policy at Cisco was birthed from the proliferation of smartphones and from Cisco employee desire to use a device of their choice (frankly the iPhone played a key role), rather than be limited in the preset choices IT provided.

In my hour-long interview with Brett, I wanted to understand how companies should go about creating a strategy to address the issue. You will not hear Brett talk about any Cisco products; rather he answers these three questions:

–    Why is having a mobile device access policy important?
–    How did Cisco create a “bring your own device” (BYOD) policy?
–    Any best practices to setting such policies?

Editing our conversation down to less than four minutes was tough enough, so I think a repeat interview with Brett is in order. But instead of me coming up with questions this time, what questions do you have for Brett?

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. If you’d like to see my entire Cisco Live presentation, visit and register for your free account. I’m listed in the 2011-2012 session catalog, then under IT Management Program, then look for ITMGEN-2010. You can also follow me on twitter — @bbelding

  2. There should always be security measures in every technology that’s being released to the public.

  3. Great interview, I enjoyed watching it.

  4. if it is very interesting

  5. I really enjoyed our interview as well. I’m happy to share any additional information with anyone who leaves a comment here. Thanks for watching!