Archive for Network Security Category

3 Main Challenges of BYOD (and How to Resolve Them)

3 Main Challenges of BYOD (and How to Resolve Them)Bring Your Own Device or BYOD – the acronym has IT managers across the country wondering how to deal with the phenomenon that’s currently rocking the business world. Whether you’re dealing with this in business, schools, municipalities or health care, this is an issue that affects everyone.

Why there are Challenges

Customers, vendors, employees, guests bring all kinds of communication devices to offices and campuses expecting to log onto the network and access the Internet or the appropriate applications. Devices used range from smart phones through laptops, netbooks and tablets that run a variety of different operating systems.

So what are the main challenges the BYOD trend poses for your business, and how can you combat them?

Challenge #1: How do you insure that guest devices have access to the correct company applications and resources, while securing the confidentiality of your data?

BYOD is reshaping the way we think about IT, in particular with regard to network security. Mobile devices owned by employees, vendors or customers are outside the scope of your internal IT team, and the growth in mobile malware increases the risk of compromising your data. To ensure the integrity of confidential data on devices that the company doesn’t own, you need to be able to provide guests with access to specific applications and storage, while protecting sensitive information.

How to resolve this: Implement a wireless LAN that offers an advanced level of unified access control that identifies users based on their profile and allows access only to specific network sections. The Avaya Identity Engine enables multiple users to connect their devices using an advanced level of unified access control (UAC). Guests gain access to specific sections of the network only depending on user permissions, and redirects suspect devices to a quarantine section. It also enables the host to check out new devices based on rule sets before allowing them to have full access.

Challenge #2: How do you provide easy to administer, fast, secure access to the internet for non-company, non-standard guest devices?

Help desks are required to support a much wider range of devices and software than they have previously been accustomed to. As the number of users grows, so does the difficulty of ensuring continuous up-time, while at the same time building a “scalable” network that can accommodate fluctuating numbers of users – without requiring additional staff and controllers to do so.

How to resolve this: Harness controller-free Wi-Fi with mobile device management options, automate connectivity, management and monitoring through profile enrollment and re-enrollment, and enhance network security protocols for the most commonly-used devices, such as:

  • Android
  • Apple iOS
  • Mac OS X
  • Blackberry
  • Windows Mobile

Set up policies regarding the use of the different types of devices for the Identity Engine to check before allowing full access.

Challenge #3: How do you protect your data from malware and viruses brought in by unprotected BYOD devices?

Unknown devices bring with them the potential to cause havoc on your network in the form of malware and viruses. Before enabling them to connect, organizations need to ensure that the device is free of any infections and that it complies with the required protocols to prevent it from delivering any surprises.

How to resolve this: Avaya’s Identity Engine registers and fingerprints devices the first time they try to connect, and configures them to securely access the network based on the organization’s policies. The system scrutinizes the device to see if it meets anti-virus and other requirements, and configures the device if necessary to ensure that it is secure. Future access is based on login credentials enabled after the first visit.

Click here to schedule a consultation and find out ways in which Surazal Systems’ wireless LAN can help you turn the challenges of BYOD into advantages for your business and budget.