FINAL WORD
Why BYOD
doesn’t
have to be
your biggest
headache
Eight best practices
to protect your
enterprise network
Smartphones and other
personal devices can now be
found in most businesses as
users are staying connected
to the corporate network
from anywhere, any time.
It’s the stuff that keeps IT
and security managers up
at night with mobile users,
multiple devices per user and
enterprise data on the move.
Manish Bhardwaj, Senior
Marketing Manager, Middle
East and Turkey at Aruba, a
Hewlett Packard Enterprise
company, tells us how to best
protect the network.
S
ecurity for Bring Your Own Device
(BYOD) and mobile must now
be part of a larger conversation
when securing the network for the new
digital workplace. Based on existing
customers’ best practices, here are
eight things you can do to boost
network security amid BYOD.
1. Assign roles to users and devices
With users carrying multiple devices, it’s
smart to standardise on user roles across
the organisation, and then assign device
roles too. A smartphone issued by IT
for a specific purpose may require more
access privileges than a personal device.
IT-issued laptops would have different
roles than smartphones and tablets. The
value is your ability to create different
rules for each device type or role.
User and device roles also let you
differentiate privileges by device type
for the same user. An IT administrator
would be allowed to change switch
and controller configurations with a
laptop assigned a corporate role. But,
that same person would not be able to
access sensitive networking equipment
using a tablet assigned a BYOD role.
www.intelligentcio.com
INTELLIGENTCIO
109