From the course: Cisco Network Security: Secure Access
Unlock the full course today
Join today to access over 24,000 courses taught by industry experts.
Managing a BYOD infrastructure - Cisco Tutorial
From the course: Cisco Network Security: Secure Access
Managing a BYOD infrastructure
- [Narrator] Bring your own device includes smartphones, laptops, tablets, and gaming devices. In this segment, we'll learn how to manage a bring-your-own-device environment using Cisco Meraki to keep data and networks secure. Despite the fact that client-owned devices can pose a risk to the corporate environment, many companies allow and even encourage their use. By far, the most common bring-your-own device is the smartphone, but there are many other devices employees want to bring in and tether to the network. Now, the concept of employee-owned devices that are not owned by the company is called shadow IT. Network administrators must address bring your own device. Companies today are accepting bring your own device into the workplace, which continues to grow at an accelerated rate. In fact, studies show that many employees have two or more mobile devices connected to the network at any given time. Managers expect employees to be always available, and users feel that mobile devices…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.