This document discusses how to turn BYOD (bring your own device) into productivity by connecting and managing mobile devices on a corporate network. It outlines strategies for securely connecting BYOD and other personal devices to the network using various authentication methods. It also discusses how to ensure devices follow security and usage policies through features like network-based mobile device management and client classification. The document emphasizes that simply connecting devices is not enough, and networks must be able to monitor and control devices once connected to prevent security issues and resource overloads from impacting productivity.