Control and Visability


byod-image

Control

Who is allowed to connect their device? Is your BYOD solution just for your Staff, Students if you are a school, or are you also planning on providing pure guest access, for vistors to your site. The Network Access Control (NAC) element of your BYOD Solution needs to allow for each of your different groups of users to be catered for, and you need to consider if you want to integrate with existing authentication sources, such as Active Directory for users with existing accounts.
What devices can be connected? Do you want to enforce compliance policies of devices, for example only allow Windows and Apple Computers, no tablets or phones. Or do you want to enforce that devices are running an up-to-date Anti Virus product. Controlling that only compliant devices can connect may be key to your BYOD strategy.
When can they connect? Is there a time limit on use of the BYOD solution, should it only allow access during operational hours, on maybe you are a boarding school, and want to enforce outage at lights out, say 10:00pm every day.
What can they connect to? Are your BYOD users going to be allowed to connect to wired and wireless networks, or limited to just wireless and specific ports in a public area, such as in a lecture hall, or library. It is important that the Network Access Control element of your BYOD solution is able to enforce policies based on network location.
What do they then get access to? So the user has connected to an allowed part of your network infrastructure, they have authenticated, and the NAC element of your BYOD solution is satisfied they are allowed on. You now need to consider the variations of who connected, to what, and where, to decide what they should access. It may be simple, you may just run a single Guest Network. However you may decide to implement further control and segmentation, and provide Network segments for different user groups or device groups. Essentially you need to consider how you are going to deliver separate security profiles to the user/device groups if and where required.

Visability

Who is connected, when did they connect, and where are they?

Maintaining visibility of your network should be a key consideration when implementing a BYOD solution.

BYOD Solution elements:

  • Network Infrastructure; that supports the connection of both corporate and personal devices.
  • Control & Visibility; to define a policy of what devices can connect and by who, to enforce the policy, and enable reporting on the connected devices.
  • Security; to ensure that connected devices can only access the resources they should be able to access, both internally and externally.
  • Productivity; to provide solutions than enable the BYOD devices to be used for a constructive means.
BYOD_Control and visability

Please Contact Us to discuss your BYOD Requirements