April 27, 2012

Best Practices for BYOD Done Right

With over 40% of employees utilizing their own devices at the workplace this year alone, it is no wonder that the single largest issue facing the enterprise today has become how to deploy and manage the chaotic world of BYOD.  A BYOD solution should deliver a uniquely comprehensive approach to handle the entire process of automating onboarding, profiling, securing, managing and troubleshooting inherent to a BYOD deployment.  Here are some BYOD best practices to consider to help you get BYOD right the first time.
Device Management that goes Beyond the Device: The very first step in any BYOD approach is to understand what devices, and more importantly which users, are requesting access to the network.  On-boarding, authentication, profiling and usage policies should be based on device and user, location, point of access and authentication type.
Comprehensive, Policy-based Security:  With different users doing very diverse tasks on a variety of devices in a BYOD environment, the ability to implement user-based Policy becomes an essential component of a BYOD deployment. A solution that offers flexible and configurable policy management and implements the policy at the edge of the network, provides enhanced security, control and performance for BYOD.
Integration with Leading MDM and VDI Vendors:  Because it is impossible to assure that all personal devices implement the same application-level security as a trusted corporate laptop, it is essential that a BYOD solution implement strong network-level security.  In addition, a solution that provides APIs to leading MDM and VDI vendors allows IT to “lock down” devices at the client level for comprehensive device security.
Don’t forget about the User Experience:  The proper deployment and configuration of the wireless network is essential to delivering a high user experience in a BYOD environment. A BYOD solution should optimize distribution of the processing load between Access Points (APs) and wireless controllers to deliver exceptional performance while remaining easy to manage. 
Deep Visibility for Troubleshooting and Cost Control: In a BYOD environment, the trouble spots from end user device to network core increase four-fold, therefore the ability to quickly identify the source of the trouble spot and isolate the problem becomes a critical requirement to reduce both the number of trouble tickets as well as the time required by IT to diagnose and remedy the problem. A BYOD solution that can automatically segment trusted employee usage, enterprise-critical business processes and guest access activity will guarantee the appropriate allocation of network resources and application capacity to insure predictable user experience.
Flexible and Scalable to Handle the Dynamic Nature of BYOD:  There will always be new devices, new applications, and new users, so a BYOD implementation must be able to handle the unknown as easily as it handles the existing installed base of devices and users.   By implementing the correct set of BYOD on-boarding profiles during the original installation, user and device policies, and capacity-planned WLAN deployments, you will insure a future-proofed network.
Enterasys offers a secure and comprehensive BYOD solution for all classes of users, trusted and guest, on any consumer device, delivering the highest user experience, with the right set of connections and resources for that user – ensuring you get BYOD right the first time.  Please visit www.onefabric.net/byod for more information.
About The Contributor:
Extreme Marketing Team

See My Other Posts