FEATURE: BYOD
Basic: Ideal for organisations that want
to offer basic network services and easy
access to almost all users. The vast
majority of the resources available on
these networks are there to be accessed
- not to be protected. The small amount
of data that requires protection, such
as grades and salary information, can
be easily placed on a secure VLAN and
protected from unauthorised mobile
device access.
Enhanced: This scenario is technically
more advanced and requires more
differentiated device and user access
and a wide range of security policies.
Healthcare establishments are good
candidates for this category; consider an
example where doctors would be able
to securely access patient records with
tablets while visitors would have guest
access to the Internet only.
Next-generation: Organisations under
this category are creating environments
that encourage mobile device use
and generate benefits from that use.
For example, a retail business could
take advantage of a mobile device
application to provide customers with
a more enjoyable and informative
shopping experience.
Once an organisation decides which
BYOD policy makes sense for them, they
can build an infrastructure that supports
it. As corporations begin to embrace
an “any device, anywhere” strategy in
2016, IT administrators need to address
personal mobile devices in the context
of a threat landscape characterised by
highly sophisticated and sometimes
targeted attacks.
They need to know who is on the
network, the location of that individual,
and whether they are accessing the
appropriate resources. Obtaining and
acting on this information will require
multiple departments to collaborate in
defining the processes and procedures
that comprise an appropriate and
successful mobile device strategy.
Once business and s