Achieving deeper levels of context awareness for network and endpoint devices enables IT to offer comprehensive secure access and a productive mobile user experience.

More advanced intelligence and meaningful analysis across the network and its endpoints helps IT professionals deliver a high degree of simple and customized secure access to ensure the optimal user experience. Cisco Unified Access™ provides central policy across the entire network (wired, wireless, and VPN) with system-wide visibility into and control over who is on the network. This intelligent network platform enables highly secure, connected experiences.

Given Cisco’s networking DNA, security leadership, and customer-centric approach, our network architecture helps our customers address IT transformations like BYOD and cloud computing with stronger control while improving operational efficiencies. Read more.


Dave Frampton, Vice President, Cisco Secure Access & Mobility

Client inquiries and headline stories reveal weaknesses in mobile security, a few of which can be attributed to naiveté and others to apathy. All provide object lessons for security managers seeking to improve endpoint security governance.

Key Challenges

  • The form factors, use cases and ownership of computing platforms are changing, but the same old security and privacy problems remain.
  • Security measures that users accept on company PCs are met with frustration and usability challenges in the mobile world, fueled by bring your own device (BYOD) freedom of choice and usage autonomy.


Network managers will need to add policies to their networks to gain control in bring-your-own-device environments. Here, we recommend a path from gradually allowing to fully supporting personally owned devices on the network.

Key Challenges

  • Many IT departments have little to no control over personally owned devices in today's environment.
  • The solutions that can control and secure personally owned devices (for example, mobile device management [MDM]) are still maturing.

CISCO Content

Understand the power of device and network intelligence and how to secure BYOD (personal devices on your network) better with the following resources: