FEATURE : BYOD
////////////////////////////////////////////////////////////////////////// as revoke certificates should be explored . Integration with an MDM / EMM solution should be an option in the event that device management was deployed prior
to investing in a network access policy management solution .
Make everyone happy ; simplify SSIDS
Multiple SSIDs complicate life for IT and users alike . With effective policy management enforcement in place , BYOD and corporate-owned devices can connect to common SSIDs . Reducing the options for users to choose from simplifies the user experience and makes it easier for IT to maintain SSIDs across multiple locations .
Consolidation of SSIDs can also improve Wi-Fi performance . The key to improving your security posture revolves around your ability to leverage roles , location and policy
APPLICATION CONTROL COULD BE IMPORTANT TO ENSURE ADHERENCE TO CORPORATE POLICIES .
enforcement to ensure that devices receive the access that IT expects , even when using common SSIDs . When personal devices are connected to a common 802.1X network , IT can provide Internet access only if desired .
Consider next-generation multifactor authentication ( MFA )
These days , enterprise data access is often initiated from smartphones and tablets . As these devices are easily shared , many IT professionals are turning to new forms of MFA to ensure that the user of a device is really the person requesting access . Instead of token generation devices that are easily lost , there ’ s a better way . Now when a user connects to a network or opens an application , IT can require a secondary challenge that is as simple as picking up your smartphone and scanning your fingerprint , taking a selfie or clicking on a pre-determined image from within the images library .
Conclusion
The continued rise of BYOD is inevitable , and few corporate leaders will pass up the productivity gains of a mobile workforce that pays for their own devices . But it is easy to lose track of long-term goals if you don ’ t have a solid plan .
The eight ideas presented here are just some of the things that IT should consider when preparing for BYOD .
In the end , a central component that brings everything together starts with an advanced policy management platform . One that includes AAA services , NAC , BYOD onboarding and third-party integration with event-driven remediation . •
60 INTELLIGENTCIO www . intelligentcio . com