bring your own device - cisco · which ensures all your devices stay connected. if we stay...

2
What does a typical BYOD environment look like? Bring Your Own Device Creating change for IT Bring Your Own Device (BYOD) is one of the biggest IT trends in many years, and it’s having an impact on organisations big and small. BYOD is creating sweeping changes in the way devices are used in workplaces world over. Before we get too tied-up in this megatrend, it’s important to thoroughly understand the basics of BYOD - what is it and why is it happening? What does it all mean? BYOD is the practice of employees and business partners using their own devices to access data and run workplace applications. It can allow employees to become more efficient, productive and mobile. Today, BYOD is having an impact on the way that we work and some businesses are changing their entire IT strategy - providing employees with money to purchase the device of their choice rather than investing in a standardized desktop or laptop. This does create challenges but if IT departments take the right steps to secure and run the right applications on devices, BYOD can have really positive effects. Why is everyone talking about it? It’s because BYOD is a great opportunity for end users and businesses. The former get to work with the technology that they know and love, the latter can increase productivity in and out of the office. It’s all about aligning these devices with enterprise requirements, so BYOD becomes secure, compatible and easy to support. The difficulty is that the momentum is coming from outside the IT department. Rather than being the result of corporate innovation, BYOD is driven by the consumer. The number of devices is increasing and the lines between home and work are being blurred. So there’s an opening for IT departments to offer their support and make the most out of this movement. How BYOD can benefit you? Reduce CapEx costs of IT equipment Increase employee satisfaction Promote flexible working Maximise business productivity Improve communications e-Reader Smartphone Laptop Tablet BYOD Wireless Access Security Policy Remote Security Network Management All contents are Copyright © 1992-2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Upload: others

Post on 09-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bring Your Own Device - Cisco · which ensures all your devices stay connected. If we stay connected, can we stay secure? Keeping people connected, productive and secure with their

What does a typical BYOD environment look like?

Bring Your Own Device

Creating change for ITBring Your Own Device (BYOD) is one of the biggest IT trends in many years, and it’s having an impact on organisations big and small. BYOD is creating sweeping changes in the way devices are used in workplaces world over.

Before we get too tied-up in this megatrend, it’s important to thoroughly understand the basics of BYOD - what is it and why is it happening?

What does it all mean?BYOD is the practice of employees and business partners using their own devices to access data and run workplace applications. It can allow employees to become more efficient, productive and mobile.

Today, BYOD is having an impact on the way that we work and some businesses are changing their entire IT strategy - providing employees with money to purchase the device of their choice rather than investing in a standardized desktop or laptop.

This does create challenges but if IT departments take the right steps to secure and run the right applications on devices, BYOD can have really positive effects.

Why is everyone talking about it?It’s because BYOD is a great opportunity for end users and businesses. The former get to work with the technology that they know and love, the latter can increase productivity in and out of the office. It’s all about aligning these devices with enterprise requirements, so BYOD becomes secure, compatible and easy to support.

The difficulty is that the momentum is coming from outside the IT department. Rather than being the result of corporate innovation, BYOD is driven by the consumer. The number of devices is increasing and the lines between home and work are being blurred. So there’s an opening for IT departments to offer their support and make the most out of this movement.

How BYOD can benefit you?

• Reduce CapEx costs of IT equipment

• Increase employee satisfaction

• Promote flexible working

• Maximise business productivity

• Improve communications

e-ReaderSmartphoneLaptop Tablet

BYOD

Wireless Access Security Policy

Remote Security Network Management

All contents are Copyright © 1992-2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

Page 2: Bring Your Own Device - Cisco · which ensures all your devices stay connected. If we stay connected, can we stay secure? Keeping people connected, productive and secure with their

Will it be difficult to manage wireless access?

By 2015, there will be 5 billion connected devices around the world, from a huge range of vendors. Although most will connect through Wi-Fi, performance doesn’t have to be hampered. Cisco’s solutions easily handle signals and ensure the best connection, no matter where users are.

• Client Link increases throughput for lower-speed clients and improves coverage between

cells. It ensures that all clients, regardless of location, have the best connection to the wireless network.

• CleanAir provides interference protection for your network which ensures all your devices stay connected.

If we stay connected, can we stay secure?

Keeping people connected, productive and secure with their smart devices away from the office is challenging but achievable. Our products securely connect devices away from the office and also secure all internet traffic, so everyone can stay active.

• AnyConnect is security policy enforcement that is context-aware. Simply, it delivers secure mobility across the increasing number of managed and unmanaged mobile devices.

• ScanSafe detects malware outbreaks and discovers anomalous behaviour, responding with real-time updates.

How do I apply new BYOD policies?

With all this new activity it’s important to have an effective policy that enforces compliance,

What questions should you be asking yourself about BYOD?

infrastructure security and streamlines service operations. All of this can be automated with Cisco, along with the protection of data loss, user identity and newly connected devices.

• Cisco’s ISE identifies users, their devices, what they are trying to access and where they are connecting from. It automatically provides a security policy per connection, per user and per device.

I’m the Network Manager, how do I keep track of it all?

IT managers now have the challenge of connecting different smart devices, identifying users, troubleshooting and providing reports. Cisco gives you visibility across all areas, using one simple portal that monitors all activities.

• Cisco NCS offers one-window management of Cisco networks and interfaces. This helps to deliver accelerated service deployment, lower capital expenditure, reduced operating expenses, improved service and increased operational efficiency.

All contents are Copyright © 1992-2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.