top of page


The BYOD module includes applications to provision BYOD deployments, incorporate BYOD devices into access policies, and onboard device access to the network. Highlights include:

  • Configures secure access for BYOD devices using configuration profiles

  • Authenticates BYOD devices dynamically, if needed

  • Registers and tracks BYOD devices wherever they connect

  • Allows for a manual approval process, if desired


Configuring secure network access for employees is time-consuming for users and demanding on IT staff who must fix problems and answer questions. CGX onboarding automates this process to save you time, money and resources.

  • Allow employees to self-provision personal devices for corporate network access

  • Create configuration profiles for end devices, especially BYOD

  • Create policies to require appropriate authentication and compliance

  • Provide customizable, web-based workflows to configure, register and check devices for compliance

  • Profiles are incorporated into onboarding “flow”

  • Grant different access to employee-owned devices vs. corporate-owned devices


Whether employee-owned devices have agents or are agentless, CGX can check for suspicious behavior and ensure that devices are being used properly. BYOD policies include:

  • Flags, checks and locates stolen devices on the network

  • Assigns appropriate access to BYOD devices based on device type and user

  • Ensures malicious applications are not running on devices when connected to the network

  • Ensures devices are not rooted/jail-broken using optional agent

bottom of page