Transcript
Page 1: BYOD 3600 PLANNING - accudatatest.businesscatalyst.comaccudatatest.businesscatalyst.com/assets/byod-360-degree-planning.pdfLaying the foundation for BYOD, virtual desktops centralize

THE DATA: Secure File Share

REMOTE ACCESS

THE NETWORK: Wireless, Bandwidth & Performance, Application Visibility & ControlM any companies planned wireless net works for projec ted headcount growth, but the explos ion of mobi le devices doubled or t r ip led endpoint connec t ions without increas ing headcount . Addit ional devices on the wire less net work can degrade s ignal st rength and throughput, and wire less net works implemented even t wo years ago may not be adequate today. With r ich media (HD video conferencing and streaming appl icat ions) you must see and control the t raf f ic on your net work , as wel l as s ize and architec t the net work to handle t raf f ic volume and device connec t ions.

LOCAL ACCESS: Network Access Control

I f you have web -facing appl icat ions, host your own web presence or e - commerce s i te, consider how YOUR customers access those appl icat ions. R ather than re -designing your website for mobi le access, leverage an Appl icat ion Del iver y Control ler to present a scaled- down website vers ion to mobi le devices. Present ing your publ ic s i te over IPv6 as wel l as IPv4 increases per formance and decreases load t imes.

INNOVATION

YOUR END CUSTOMERS: Application Delivery Control

A solid Bring Your Own Device (BYOD) strategy should encompass any computing device that is not 100% owned and managed by the organization, such as smartphones, tablets, laptops, and even

employee-owned computing devices that aren’t on the market yet. A smartphone is not a phone, but a powerful pocket sized computer with a phone app!

Accudata Systems, 7906 N. Sam Houston Parkway W., Suite 300, Houston Texas, 77064, www.accudatasystems. com, 800.246.4908 or 281.897.5000

STRATEGY OVERVIEW

MDM solut ions a l low auto -provis ioning of the device (set up corporate emai l , WiFi , and VPN sett ings without any inter vent ion f rom IT ) ; enforce password complexit y ; se lec t ively wipe only the sett ings and data auto -provis ioned for the company, leaving personal data untouched; and container ize apps and data on the device. Although impor tant , MDM only comprises a smal l por t ion of your BYOD strategy.

To protec t sensit ive corporate data in personal onl ine storage, provide a corporate -sanc t ioned a l ternat ive with the same func t ional i t y. Users store and access documents f rom any where on any device, whi le you e i ther store the data in YOUR c loud f i le share system or provide a gateway to documents stored on your net work , in your exist ing f i le ser ver struc ture. When i t ’s easy for users to store and share their documents in a corporate -approved manner, they are less l ikely to store them inappropr iately or use unapproved tools .

What star ted as Ac t iveSync/Emai l - only pol ic ies for BYOD has evolved into a demand for access to the net work us ing nat ive appl icat ions on mobi le devices. NAC solut ions a l low you to automatical ly determine the user, device, device posture, and locat ion and automatical ly deny or grant access to author ized data and net work resources. A cr i t ica l component of your BYOD strategy, NAC solut ions provide automated and secure di f ferent iated access, reducing IT operat ions and suppor t .

Appl icat ion v i r tual izat ion and VDI a l low you to provide corporate desktops and appl icat ions for business use regardless of whether the device is corporate - issued. Laying the foundat ion for BYOD, v i r tual desktops centra l ize a l l computing power, data , and appl icat ions so that no data is contained or work per formed on the device. Vi r tual izat ion l ikewise centra l izes secur i t y and access pol ic ies, mit igat ing much of the r isk that BYOD presents.

BYOD may be a chal lenge, but i t i s a lso an oppor tunit y to improve current business processes and end-user exper iences. For example, restaurants, movie theaters, and reta i l s tores use iPads and iPhones as point of sa le devices ; car dealers use iPads to show opt ions & specs, ca lculate payments, or run credit- checks whi le you’re s i t t ing behind the wheel of the car they want to sel l you; the hospita l i t y industr y uses mobi le devices to check guests in and out f rom any where in the hotel whi le the c leaning crew uses an app to not i fy the f ront desk when a room is ready for check- in , improving ef f ic ienc y and the user exper ience.

THE DEVICE: Mobile Device Management

Some mobile devices can suppor t native IPSec VPN, but many vendors offer a VPN cl ient for smar tphones and tablets that provides better integration with exist ing remote access solutions. Granular remote access pol icies al low secure access to only the applications and data the mobile devices need while l imit ing exposure to the rest of the network .

BYOD 3600 PLANNING

VIRTUALIZATION: Application & Virtual Desktop Infrastructure (VDI)

Page 2: BYOD 3600 PLANNING - accudatatest.businesscatalyst.comaccudatatest.businesscatalyst.com/assets/byod-360-degree-planning.pdfLaying the foundation for BYOD, virtual desktops centralize

WHERE TO BEGINSECURITY POLICY & USE CASES: The best tool for developing your BYOD strategy is an Excel Spreadsheet . C lear ly def in ing use cases helps you understand which technolo -

gies descr ibed above wi l l apply to each use case. These use cases should map to your exist ing secur i t y pol ic y. Def ine your secur i t y pol ic y f i rst , and then ident i fy tools to enforce that pol ic y.

BYOD 3600 PLANNING

ACCEPTABLE USE GUIDELINES & USER EDUCATION PROGRAM: Users want to do the r ight thing, but they need to be educated on how to safe ly use their mobi le devices and protec t corporate data . There is no technology that can completely address the human element of BYOD secur i t y r isks. Wel l informed, educated users who have a c lear understanding of the company guidel ines for mobi l i t y are cr i t ica l to a successful BYOD strategy.

VENDOR INDEPENDENT SOLUTIONS

Accudata Systems, 7906 N. Sam Houston Parkway W., Suite 300, Houston Texas, 77064, www.accudatasystems. com, 800.246.4908 or 281.897.5000

ACCUDATA’S SUPPORTING SERVICES• BYOD Health Check• Net work Health Check• Wireless Health Check

• Secur i t y Pol ic y Development• Acceptable Use Guidel ines Development• User Educat ion Program Development


Recommended