Intelligent CIO Middle East Issue 33 | Page 60

FEATURE: BYOD
////////////////////////////////////////////////////////////////////////// as revoke certificates should be explored. Integration with an MDM / EMM solution should be an option in the event that device management was deployed prior
to investing in a network access policy management solution.
Make everyone happy; simplify SSIDS
Multiple SSIDs complicate life for IT and users alike. With effective policy management enforcement in place, BYOD and corporate-owned devices can connect to common SSIDs. Reducing the options for users to choose from simplifies the user experience and makes it easier for IT to maintain SSIDs across multiple locations.
Consolidation of SSIDs can also improve Wi-Fi performance. The key to improving your security posture revolves around your ability to leverage roles, location and policy

APPLICATION CONTROL COULD BE IMPORTANT TO ENSURE ADHERENCE TO CORPORATE POLICIES.

enforcement to ensure that devices receive the access that IT expects, even when using common SSIDs. When personal devices are connected to a common 802.1X network, IT can provide Internet access only if desired.
Consider next-generation multifactor authentication( MFA)
These days, enterprise data access is often initiated from smartphones and tablets. As these devices are easily shared, many IT professionals are turning to new forms of MFA to ensure that the user of a device is really the person requesting access. Instead of token generation devices that are easily lost, there’ s a better way. Now when a user connects to a network or opens an application, IT can require a secondary challenge that is as simple as picking up your smartphone and scanning your fingerprint, taking a selfie or clicking on a pre-determined image from within the images library.
Conclusion
The continued rise of BYOD is inevitable, and few corporate leaders will pass up the productivity gains of a mobile workforce that pays for their own devices. But it is easy to lose track of long-term goals if you don’ t have a solid plan.
The eight ideas presented here are just some of the things that IT should consider when preparing for BYOD.
In the end, a central component that brings everything together starts with an advanced policy management platform. One that includes AAA services, NAC, BYOD onboarding and third-party integration with event-driven remediation. •
60 INTELLIGENTCIO www. intelligentcio. com