2
THE DATA: Secure File Share REMOTE ACCESS THE NETWORK: Wireless, Bandwidth & Performance, Application Visibility & Control Many companies planned wireless networks for projected headcount growth, but the explosion of mobile devices doubled or tripled endpoint connections without increasing headcount. Additional devices on the wireless network can degrade signal strength and throughput, and wireless networks implemented even two years ago may not be adequate today. With rich media (HD video conferencing and streaming applications) you must see and control the traffic on your network, as well as size and architect the network to handle traffic volume and device connections. LOCAL ACCESS: Network Access Control If you have web-facing applications, host your own web presence or e-commerce site, consider how YOUR customers access those applications. Rather than re- designing your website for mobile access, leverage an Application Delivery Controller to present a scaled-down website version to mobile devices. Presenting your public site over IPv6 as well as IPv4 increases performance and decreases load times. INNOVATION YOUR END CUSTOMERS: Application Delivery Control A solid Bring Your Own Device (BYOD) strategy should encompass any computing device that is not 100% owned and managed by the organization, such as smartphones, tablets, laptops, and even employee-owned computing devices that aren’t on the market yet. A smartphone is not a phone, but a powerful pocket sized computer with a phone app! Accudata Systems, 7906 N. Sam Houston Parkway W., Suite 300, Houston Texas, 77064, www.accudatasystems. com, 800.246.4908 or 281.897.5000 STRATEGY OVERVIEW MDM solutions allow auto-provisioning of the device (set up corporate email, WiFi, and VPN settings without any intervention from IT); enforce password complexity; selectively wipe only the settings and data auto- provisioned for the company, leaving personal data untouched; and containerize apps and data on the device. Although important, MDM only comprises a small portion of your BYOD strategy. To protect sensitive corporate data in personal online storage, provide a corporate-sanctioned alternative with the same functionality. Users store and access documents from anywhere on any device, while you either store the data in YOUR cloud file share system or provide a gateway to documents stored on your network, in your existing file server structure. When it’s easy for users to store and share their documents in a corporate-approved manner, they are less likely to store them inappropriately or use unapproved tools. What started as ActiveSync/Email-only policies for BYOD has evolved into a demand for access to the network using native applications on mobile devices. NAC solutions allow you to automatically determine the user, device, device posture, and location and automatically deny or grant access to authorized data and network resources. A critical component of your BYOD strategy, NAC solutions provide automated and secure differentiated access, reducing IT operations and support. Application virtualization and VDI allow you to provide corporate desktops and applications for business use regardless of whether the device is corporate-issued. Laying the foundation for BYOD, virtual desktops centralize all computing power, data, and applications so that no data is contained or work performed on the device. Virtualization likewise centralizes security and access policies, mitigating much of the risk that BYOD presents. BYOD may be a challenge, but it is also an opportunity to improve current business processes and end-user experiences. For example, restaurants, movie theaters, and retail stores use iPads and iPhones as point of sale devices; car dealers use iPads to show options & specs, calculate payments, or run credit-checks while you’re sitting behind the wheel of the car they want to sell you; the hospitality industry uses mobile devices to check guests in and out from anywhere in the hotel while the cleaning crew uses an app to notify the front desk when a room is ready for check-in, improving efficiency and the user experience. THE DEVICE: Mobile Device Management Some mobile devices can support native IPSec VPN, but many vendors offer a VPN client for smartphones and tablets that provides better integration with existing remote access solutions. Granular remote access policies allow secure access to only the applications and data the mobile devices need while limiting exposure to the rest of the network. BYOD 360 0 PLANNING VIRTUALIZATION: Application & Virtual Desktop Infrastructure (VDI)

BYOD 3600 PLANNING - accudatatest.businesscatalyst.comaccudatatest.businesscatalyst.com/assets/byod-360-degree-planning.pdfLaying the foundation for BYOD, virtual desktops centralize

  • Upload
    others

  • View
    16

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BYOD 3600 PLANNING - accudatatest.businesscatalyst.comaccudatatest.businesscatalyst.com/assets/byod-360-degree-planning.pdfLaying the foundation for BYOD, virtual desktops centralize

THE DATA: Secure File Share

REMOTE ACCESS

THE NETWORK: Wireless, Bandwidth & Performance, Application Visibility & ControlM any companies planned wireless net works for projec ted headcount growth, but the explos ion of mobi le devices doubled or t r ip led endpoint connec t ions without increas ing headcount . Addit ional devices on the wire less net work can degrade s ignal st rength and throughput, and wire less net works implemented even t wo years ago may not be adequate today. With r ich media (HD video conferencing and streaming appl icat ions) you must see and control the t raf f ic on your net work , as wel l as s ize and architec t the net work to handle t raf f ic volume and device connec t ions.

LOCAL ACCESS: Network Access Control

I f you have web -facing appl icat ions, host your own web presence or e - commerce s i te, consider how YOUR customers access those appl icat ions. R ather than re -designing your website for mobi le access, leverage an Appl icat ion Del iver y Control ler to present a scaled- down website vers ion to mobi le devices. Present ing your publ ic s i te over IPv6 as wel l as IPv4 increases per formance and decreases load t imes.

INNOVATION

YOUR END CUSTOMERS: Application Delivery Control

A solid Bring Your Own Device (BYOD) strategy should encompass any computing device that is not 100% owned and managed by the organization, such as smartphones, tablets, laptops, and even

employee-owned computing devices that aren’t on the market yet. A smartphone is not a phone, but a powerful pocket sized computer with a phone app!

Accudata Systems, 7906 N. Sam Houston Parkway W., Suite 300, Houston Texas, 77064, www.accudatasystems. com, 800.246.4908 or 281.897.5000

STRATEGY OVERVIEW

MDM solut ions a l low auto -provis ioning of the device (set up corporate emai l , WiFi , and VPN sett ings without any inter vent ion f rom IT ) ; enforce password complexit y ; se lec t ively wipe only the sett ings and data auto -provis ioned for the company, leaving personal data untouched; and container ize apps and data on the device. Although impor tant , MDM only comprises a smal l por t ion of your BYOD strategy.

To protec t sensit ive corporate data in personal onl ine storage, provide a corporate -sanc t ioned a l ternat ive with the same func t ional i t y. Users store and access documents f rom any where on any device, whi le you e i ther store the data in YOUR c loud f i le share system or provide a gateway to documents stored on your net work , in your exist ing f i le ser ver struc ture. When i t ’s easy for users to store and share their documents in a corporate -approved manner, they are less l ikely to store them inappropr iately or use unapproved tools .

What star ted as Ac t iveSync/Emai l - only pol ic ies for BYOD has evolved into a demand for access to the net work us ing nat ive appl icat ions on mobi le devices. NAC solut ions a l low you to automatical ly determine the user, device, device posture, and locat ion and automatical ly deny or grant access to author ized data and net work resources. A cr i t ica l component of your BYOD strategy, NAC solut ions provide automated and secure di f ferent iated access, reducing IT operat ions and suppor t .

Appl icat ion v i r tual izat ion and VDI a l low you to provide corporate desktops and appl icat ions for business use regardless of whether the device is corporate - issued. Laying the foundat ion for BYOD, v i r tual desktops centra l ize a l l computing power, data , and appl icat ions so that no data is contained or work per formed on the device. Vi r tual izat ion l ikewise centra l izes secur i t y and access pol ic ies, mit igat ing much of the r isk that BYOD presents.

BYOD may be a chal lenge, but i t i s a lso an oppor tunit y to improve current business processes and end-user exper iences. For example, restaurants, movie theaters, and reta i l s tores use iPads and iPhones as point of sa le devices ; car dealers use iPads to show opt ions & specs, ca lculate payments, or run credit- checks whi le you’re s i t t ing behind the wheel of the car they want to sel l you; the hospita l i t y industr y uses mobi le devices to check guests in and out f rom any where in the hotel whi le the c leaning crew uses an app to not i fy the f ront desk when a room is ready for check- in , improving ef f ic ienc y and the user exper ience.

THE DEVICE: Mobile Device Management

Some mobile devices can suppor t native IPSec VPN, but many vendors offer a VPN cl ient for smar tphones and tablets that provides better integration with exist ing remote access solutions. Granular remote access pol icies al low secure access to only the applications and data the mobile devices need while l imit ing exposure to the rest of the network .

BYOD 3600 PLANNING

VIRTUALIZATION: Application & Virtual Desktop Infrastructure (VDI)

Page 2: BYOD 3600 PLANNING - accudatatest.businesscatalyst.comaccudatatest.businesscatalyst.com/assets/byod-360-degree-planning.pdfLaying the foundation for BYOD, virtual desktops centralize

WHERE TO BEGINSECURITY POLICY & USE CASES: The best tool for developing your BYOD strategy is an Excel Spreadsheet . C lear ly def in ing use cases helps you understand which technolo -

gies descr ibed above wi l l apply to each use case. These use cases should map to your exist ing secur i t y pol ic y. Def ine your secur i t y pol ic y f i rst , and then ident i fy tools to enforce that pol ic y.

BYOD 3600 PLANNING

ACCEPTABLE USE GUIDELINES & USER EDUCATION PROGRAM: Users want to do the r ight thing, but they need to be educated on how to safe ly use their mobi le devices and protec t corporate data . There is no technology that can completely address the human element of BYOD secur i t y r isks. Wel l informed, educated users who have a c lear understanding of the company guidel ines for mobi l i t y are cr i t ica l to a successful BYOD strategy.

VENDOR INDEPENDENT SOLUTIONS

Accudata Systems, 7906 N. Sam Houston Parkway W., Suite 300, Houston Texas, 77064, www.accudatasystems. com, 800.246.4908 or 281.897.5000

ACCUDATA’S SUPPORTING SERVICES• BYOD Health Check• Net work Health Check• Wireless Health Check

• Secur i t y Pol ic y Development• Acceptable Use Guidel ines Development• User Educat ion Program Development