Put Some ISE On Those BYOD Security Pains [Cisco]

Put Some ISE On Those BYOD Security Pains

There’s no denying it: employee-owned mobile devices, with frequent off-site network access, are the new normal for the next generation of workers.

Although adoption of BYOD programs is steadily climbing, security concerns for IT leaders continue to deepen. A 2012 Forrester survey of senior IT executives confirms security is their Number 1 concern regarding BYOD. And a 2012 Economist Intelligence Unit study cited corporate security as the biggest obstacle to implementing BYOD.

Making matters worse, yesterday’s mobile-access security solutions created in the past, no longer apply to today’s ubiquitous mobile-worker environments. There is simply too much complexity for legacy mobile device management (MDM) technology to deliver the functionality needed to protect corporate data and deliver the right user experience.

What companies need now is a security solution built with the challenges of today’s BYOD implementations in mind. This is where solutions such as Cisco’s Identity Services Engine (ISE) come into play.

Continue reading to get details on how Cisco is addressing this space, and find out more about a Mobility Webinar I’ll be hosting in December.

[Read more…]

How the Employee Choice model for mobile devices can be easily managed with the right partners [Apple]

The traditional model of “one computer fits all” within an organization is shifting. Even the effort of selecting a desktop or laptop standard per user role or department does not offer the flexibility that today’s tech-savvy worker is demanding from their employer. Started with mobile devices (smartphones and tabl… ok, let’s be honest: iPads) the phenomenon has trickled into the core client computing systems, manly laptops.

What’s the incentive for businesses to encourage this behaviour? Organizations that have adopted this model find more happy and productive workers when you allow them to choose the platform they want to work on. It’s also a strong recruitment tool to get the best and brightest talent onboard. The era of “This is your beige box, this is your black phone” from one company is being challenged with “Would you prefer a Mac or Windows computer? iPhone or Blackberry?” by their competition. And today’s Datacenter infrastructure definitely has the guts to run run virtual desktops and applications in these scenarios – just ask our own Jonathan White.

However beneficial this policy may be to recruit and retain talent, IT Managers and CIOs are frustrated with the lack of security on a “rogue” device entering their infrastructure. Counting on a personal computer’s uptime when the manufacturer is not the company’s standard can also be a pain; [Read more…]

The secret sauce in managing iPads and iPhones [Apple]

Mobile devices are making their way into the enterprise at an alarming rate which is not slowing down any time soon. The adoption is happening one of two ways:

Enterprise-lead adoption: A controlled roll out by the IT staff

User-lead adoption: Tech-savvy employees bringing in their own devices and connecting to the company network for email and access to other sensitive data.

The challenge for the IT department in either scenario is the same [Read more…]