Guest

Design Zone

Bring Your Own Device

Secure Mobile Device Access

Provide IT controls to ensure access and data security while enabling end user device options.

Secure Mobile Device Access

Viewing this video requires the latest version of Adobe Flash Player with JavaScript enabled.

Get the Flash Player

Unified Access and Bring Your Own Device

July 11, 2014

Strengthen BYOD Security

Cisco Unified Access architecture helps ensure security and prevent data loss.

Read Unified Access and BYOD Design Guide

The Cisco Validated Design guide presented here covers the Cisco Unified Access foundation network and then discusses how customers can deploy BYOD initiatives to insure the right IT visibility and policies.

Improve Your Policy Integration

The Cisco BYOD Smart Solution Design Guide has been updated to provide lab-validated best practices including:

  • Integrating the Cisco Identity Services Engine (ISE) with industry-leading Mobile Device Management (MDM) platforms for more comprehensive on-boarding experience, device policy, and security
  • Incorporating Cisco's Converged Access products (Catalyst 3850) into the BYOD design
  • Providing more scalable policy enforcement with Cisco TrustSec Secure Group Access (SGA) technology
  • Improving the mobile experience with Cisco Application Visibility and Control (AVC) on the enterprise WiFi

Cisco BYOD reference design builds on borderless network design best practices for wired, wireless, and secure mobility in campus, branch office, internet edge, and home office environments. Cisco BYOD architecture integrates critical components that allow secure, easy access to the network for any device and centralized enforcement of company usage policies.

The Cisco BYOD solution helps IT organizations address the following challenges:

  • Providing device choice and support
  • Maintaining secure access to the corporate network
  • Adding new devices
  • Enforcing company usage policies
  • Visibility of devices on the network
  • Protecting data and preventing loss
  • Revoking access
  • Circumventing new attack vectors
  • Ensuring wireless LAN performance and reliability
  • Managing the increase in connected devices

For Partners

Log in to access tools and resources specifically designed for Channel Partners who want to get the most out of the Cisco Bring Your Own Device(BYOD)Smart Solution.

Let Us Help