From the course: Cisco Network Security: Secure Access

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Managing a BYOD infrastructure

Managing a BYOD infrastructure - Cisco Tutorial

From the course: Cisco Network Security: Secure Access

Managing a BYOD infrastructure

- [Narrator] Bring your own device includes smartphones, laptops, tablets, and gaming devices. In this segment, we'll learn how to manage a bring-your-own-device environment using Cisco Meraki to keep data and networks secure. Despite the fact that client-owned devices can pose a risk to the corporate environment, many companies allow and even encourage their use. By far, the most common bring-your-own device is the smartphone, but there are many other devices employees want to bring in and tether to the network. Now, the concept of employee-owned devices that are not owned by the company is called shadow IT. Network administrators must address bring your own device. Companies today are accepting bring your own device into the workplace, which continues to grow at an accelerated rate. In fact, studies show that many employees have two or more mobile devices connected to the network at any given time. Managers expect employees to be always available, and users feel that mobile devices…

Contents