Control BYOD Devices

There are many tradeoffs when adopting a BYOD strategy. However, the benefits of productivity, usability, and cost reduction have to be factored against the challenges of risk, manageability, and overall security.
According to a recent SAN Mobility/BYOD Security Survey, over 60% of organizations are embracing some form of BYOD but only 9% of organizations are confident they know the devices on their network. Network Sentry from Bradford Networks solves this problem.

Guest Management and Self-Registration

Managing the onboarding of guests and employee laptops, tablets, and smartphones to your network, can be a labour intensive and error-prone task. Network Sentry simplifies onboarding by streamlining the registration process. Onboarding of guests can be delegated to administrative staff and, when appropriate, users can self-register their own devices shifting the workload from IT to the end users.

Endpoint Compliance

The average number of devices per user is on the rise. This phenomenon also increases the attack surface of your network. Ensuring the integrity of wired and wireless devices before they connect to your network minimizes the risk of vulnerabilities and the spread of exploits and malware. Network Sentry, with agentless, dissolvable agent, or a persistent agent, validates the endpoint’s configuration as it tries to join the network. If the configuration is not compliant (i.e. patch missing, outdated antivirus, jailbroken device) then connections can be prevented or users can be warned until the endpoints are remediated.

Network Provisioning

Segmenting a network and classifying data are two best practices for data protection. Network Sentry, with role-based access control policies, ensures the right users on the right devices gain access to the right set of network segments. Users on corporate issued devices, because they are centrally managed by IT, may have more access on corporate issued devices than personally owned (BYOD) devices.

The Bradford Networks Solution