FINAL WORD
7. Make everyone happy –
simplify SSIDS
Multiple SSIDs complicate life for
IT and users alike. With effective
policy management enforcement in
place, BYOD and corporate-owned
devices can connect to common
SSIDs. Reducing the options for users
to choose from simplifies the user
experience, and makes it easier for
IT to maintain SSIDs across multiple
locations. Consolidation of SSIDs can
also improve Wi-Fi performance.
turning to new forms of MFA to ensure
that the user of a device is really the
person requesting access. Instead of
token generation devices that are easily
lost, there’s a better way.
Now when a user connects to a network
or opens an application, IT can require
a secondary challenge that is as simple
as picking up your smartphone and
scanning your fingerprint, taking a selfie,
or clicking on a pre-determined image
from within the images library.
Conclusion
Manish Bhardwaj, Senior Marketing
Manager, Middle East and Turkey
at Aruba
The key to improving your security
posture revolves around your ability
to leverage roles, location and policy
enforcement to ensure that devices
receive the access that IT expects,
even when using common SSIDs.
When personal devices are connected
The continued rise of BYOD is
inevitable, and few corporate leaders
will pass up the productivity gains of
a mobile workforce that pays for their
own devices. But it is easy to lose track
of long-term goals if you don’t have a
By automating the discovery and
onboarding of non-compliant devices,
you can reduce costs and improve your
security posture. This also allows users
to re-onboard their own devices when
smartphones and tablets are replaced,
which also reduces the time IT has to
spend on device onboarding.
6. Go with certificates – They’re more
secure than passwords
Users will connect to guest networks
more frequently leaving passwords
exposed to theft, which makes
certificates a cornerstone of a secure
mobile device deployment. As the use
of active directory and an internal
PKI for BYOD is not a best practice, an
independent Certificate Authority
(CA) built to support personal devices
is preferred.
A policy management solution that
includes the ability to distribute and
update, as well as revoke certificates
should be explored. Integration with
an MDM/EMM solution should be
an option in the event that device
management was deployed prior to
investing in a network access policy
management solution.
www.intelligentcio.com
to a common 802.1X network, IT can
provide Internet access only if desired.
8. Consider next-generation multi-
factor authentication (MFA)
These days, enterprise data access is
often initiated from smartphones and
tablets. As these devices are easily
shared, many IT professionals are
solid plan. These eight ideas are just
some of the things that should be
considered when preparing for BYOD.
In the end, a central component that
brings everything together starts with
an advanced policy management
platform. One that includes AAA
services, NAC, BYOD onboarding and
third-party integration with event-
driven remediation. n
INTELLIGENTCIO
111