Search Results for: BYOD

BYOD Security: 5 Ways Meraki Manages Networking in The Cloud [Cisco]

BYOD Security: 5 Ways Meraki Manages Networking in The Cloud [Cisco]Besides being cost-efficient and quick to deploy, cloud-based services are flexible and scalable to fit your needs and your budget as they evolve over time. And cloud-based service providers usually take care of major issues (and costs) related to security, backup, storage and computing capacity – so you don’t have to.

What cloud-based networking brings to BYOD

Today’s cloud-based networking solutions also have an incredible array of BYOD management  and security  features baked right into them. It makes sense when you look at the risks involved with something as common as a guest WiFi network, for example. Many companies provide guest WiFi networks so customers or partners can use the Internet while visiting their offices. But what if a guest’s smartphone is infected with mobile malware that’s programmed to automatically infect any network (like yours) that it comes into contact with? It could make for an unpleasant visit – especially if your firewalls aren’t up to date and your guest WiFi network isn’t completely isolated from your internal corporate network!

[Read more…]

Security for Your BYOD Environment in 3 Simple Steps [Cisco]

BYOD is happening (like it or not): 3 basic steps you need to take

This post is for IT folks who would like to understand the minimum steps required to secure their network in an age where so many devices are attempting to connect to your network. An earlier post looked at developing policies for a formal BYOD program – this post is more about securing your environment (with or without a formal BYOD program). It covers employee’s personally owned devices that they bring to work with them, as well as visitors who are looking for a connection to the internet through your network.

It is possible to manage risk in your current BYOD situation today. Here are some tips and technology tools that take care of your existing BYOD needs now, even if your important BYOD policy plans aren’t quite polished yet. [Read more…]

Put Some ISE On Those BYOD Security Pains [Cisco]

Put Some ISE On Those BYOD Security Pains

There’s no denying it: employee-owned mobile devices, with frequent off-site network access, are the new normal for the next generation of workers.

Although adoption of BYOD programs is steadily climbing, security concerns for IT leaders continue to deepen. A 2012 Forrester survey of senior IT executives confirms security is their Number 1 concern regarding BYOD. And a 2012 Economist Intelligence Unit study cited corporate security as the biggest obstacle to implementing BYOD.

Making matters worse, yesterday’s mobile-access security solutions created in the past, no longer apply to today’s ubiquitous mobile-worker environments. There is simply too much complexity for legacy mobile device management (MDM) technology to deliver the functionality needed to protect corporate data and deliver the right user experience.

What companies need now is a security solution built with the challenges of today’s BYOD implementations in mind. This is where solutions such as Cisco’s Identity Services Engine (ISE) come into play.

Continue reading to get details on how Cisco is addressing this space, and find out more about a Mobility Webinar I’ll be hosting in December.

[Read more…]