SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
white paper 
BYOD: 
BRING YOUR 
OWN DEVICE. 
On-boarding and Securing Devices 
in Your Corporate Network
PAGE 2 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
Preparing Your Network 
to Meet Device Demand 
The proliferation of smartphones and tablets brings increased productivity, mobility and 
responsiveness to the workplace while reducing costs. Employees want to use their 
own devices at work – and employers are starting to see the value in letting them. The 
movement, called Bring Your Own Device – or BYOD – is taking hold. 
Adopting the “say no” approach to BYOD is probably unrealistic. Employees will bring 
these devices whether you support them or not, and their presence on your network 
without the right security tools for support increases risk of data breaches, data loss and 
noncompliance. A proactive BYOD strategy increases security and compliance. 
Many organizations have not yet addressed the technical issues that BYOD brings to 
the table. For example, is your corporate network and security architecture designed 
to support unmanaged devices? Whether you’re sitting in the CIO office or manning the 
support desk, you’ll need to safeguard against security risks and loss of infrastructure 
control as new, privately-owned devices connect to your networks. 
Key Challenges of BYOD Devices 
Because BYODs do not have LAN ports, and the cellular technologies that drive them 
are not designed for corporate access, the optimal method for connecting devices to the 
corporate network is Wi-Fi™. A Wi-Fi™ connection is also highly reliable and delivers 
speed that users crave. But delivering this kind of service has its challenges. In this paper, 
we’ll consider: 
• Key threats and challenges that CIO’s face when migrating 
unmanaged devices onto their corporate networks 
• Important issues for CIO’s to consider when they are framing policies 
for BYODs to ensure secure integration with the corporate network 
• How Motorola’s WiNG 5 Wireless LAN architecture and features help 
enterprises in deploying a secure BYOD solution
PAGE 3 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
CORPORATE-ISSUED 
Managing Employee Owned Devices 
Allowing unmanaged devices access to the corporate 
network without taking the proper precautions can pose 
huge security risks, introducing the threat of malware – 
and malware can bring viruses, Trojans, spyware, root kits 
and other attacks to your network. Enhancing your security 
architecture as part of a robust BYOD strategy allows 
BYODs access to sensitive data while removing the threats. 
NEW DEVICE 
CORPORATE, 
PERSONAL, OR 
GUEST DEVICE? 
GUEST 
AUTHENTICATE 
VLAN FOR INTERNET 
ACCESS ONLY 
AUTHENTICATE: 
SET TO CORPORATE 
ACCESS. 
PERSONAL-OWNED 
QUARANTINE VLAN 
DEVICE TYPE/OS 
- Up to revision? 
- Register to 
user-authenticate 
set to limited 
corporate access, 
email, etc. 
IT administrators must be able to identify which devices 
are corporate-issued and which are employee-owned so 
that they can differentiate network access privileges for 
each type of device. Having granular control over network 
resources that can be accessed from an employee-owned 
device is a key component to eliminating potential security 
risks. 
Consider setting a policy that allows the employee-owned 
device to access a limited number of applications, such as 
e-mail and calendar programs, and block access to other 
Intranet-based applications like finance, human resources 
or sales. 
A second challenge from an administrative perspective is 
how to on-board these employee-owned devices without 
a labor-intensive registration process so that they connect 
automatically and securely to the corporate network. Of 
course, the challenge here is anticipating registration for a 
host of devices that have different operating systems and 
manufacturers, as well as various versions, capabilities and 
limitations. 
The third challenge is ensuring good network performance 
and sufficient capacity. You can imagine that the number 
of Wi-Fi™ devices at your workplace will grow a great deal 
once you announce your BYOD policy. Don’t forget that 
the applications that run on these devices require a great 
deal of bandwidth, as well. Your corporate IT department 
needs to ensure that the Wi-Fi™ network infrastructure 
is designed to handle the increased number of Wi-Fi™ 
devices without a negative impact on network capacity 
and performance.
PAGE 4 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
Wi-Fi™ Design Considerations for BYOD 
Existing Infrastructure: 
Corporate SSID + Guest SSID BYOD - 
Secure Separate SSID/Corporate SSID 
AUTHENTICATION 
WLAN DESIGN 
DEVICE 
ON-BOARDING 
IT STRATEGY 
Plan for Future: 
Personal computing devices 
Wi-Fi™ design considerations for IT revolves around five key areas. 
Wi-Fi Network Design 
Today, most corporate wireless networks run two different 
Wi-Fi™ networks – a secure Wi-Fi™ network for corporate 
devices and an open Wi-Fi™ network for guest devices. 
The first step in planning a BYOD implementation for your 
company is to decide whether you want the employee-owned 
devices to connect to the existing secure corporate 
Wi-Fi™ network, or if you want to create a separate secure 
BYOD Wi-Fi™ network for employee-owned devices. 
Having employee-owned devices connect to a separate 
Wi-Fi™ network provides a flexible deployment model 
for corporate IT. It allows employees to choose a security 
method and frees them from being tied to the established 
corporate method. In general, many enterprises prefer to 
deploy a separate secure Wi-Fi™ network for employee-owned 
devices. 
ACCESS 
CONTROL 
802.1x - PEAP/TLS 
Pre Shared Key 
Captive Portal for registration and 
auto device configuration 
Role-based Firewall 
Access Control policies 
Authentication 
Selecting the right authentication method is critical 
because employee-owned devices should access only 
the appropriate corporate applications – it’s up to you to 
decide which applications you want employees to access. 
The method you choose should be easy to deploy and work 
across a wide range of devices. The most widely adopted 
authentication methods include: 
Captive Portal 
Also known as “guest access” or a “hotspot”, Captive 
Portal allows wireless infrastructure to segment the traffic 
into a separate VLAN/network. Easy to set up, it can 
integrate with the existing corporate Active Directory user 
database and works with any device as it is based on a 
standard browser. The biggest drawback is that wireless 
communication occurs on an unsecured network, which is 
not recommended for corporate networks. However, it is 
suitable for a guest network requiring internet access. 
WPA / WPA-2 PSK (Pre Shared Keys) 
Allows secure wireless communication, but the shared key 
needs to be securely distributed to all end devices. Since 
these keys are stored permanently, lost or stolen devices 
can open the door for unauthorized access.
PAGE 5 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
802.1x – Username/Password or Certificates 
The most popular authentication method deployed in 
corporate Wi-Fi™ networks for corporate devices, 802.1x 
can either be based on usernames and passwords or can 
be based on certificates. 802.1x is very secure and can 
integrate with existing corporate Active Directory and 
domain control can be enforced. 
Many enterprises do not have the infrastructure for an 
802.1x-based authentication mechanism and prefer to use 
PSK. For such enterprises, Motorola’s WiNG 5 architecture 
provides dual layer of security by combining captive portal 
functionality on top of PSK. This ensures that an employee-owned 
device that wants to enter your wireless network 
will require keys and will also need to authenticate 
through the captive portal every time the user logs onto 
the network. This method imposes a bit more login time 
on the part of the user, but it represents the best trade-off 
between usability and security. 
Welcoming Devices On-board 
Proper device on-boarding should seamlessly adopt 
employee-owned devices onto your corporate network 
with minimal IT intervention and effort. When an employee 
tries to register their personal device with your corporate 
network, the infrastructure validates user credentials and 
then binds that user’s network access and privilege data. 
Once registered, the end device should be configured 
to connect to your secure Wi-Fi™ network with the 
appropriate application and resource access. 
Access Control 
One of the key components of a successful BYOD 
implementation is the ability to distinguish a corporate-issued 
device from an employee-owned device and assign 
the appropriate access to each type of device. 
Motorola’s WiNG 5 Role-Based Firewall is an integral 
component of the solution that applies roles to devices and 
enforces differential access rights to each role. Multiple 
parameters can be used to assign a role. Below are some 
of the common methods used to classify devices. 
Machine Authentication 
It’s more than likely that your company has corporate-issued 
Windows™-based devices that will be part of the 
domain and will join the domain each time they access the 
network. Non-corporate Windows™ devices as well as 
non-Windows™-based devices can never join the domain. 
It is important to create a policy that can be configured 
in the corporate RADIUS server which assigns groups to 
the device based on whether or not the device has passed 
machine authentication. Any device that passes both 
machine authentication and user authentication can be 
assigned to the “corporate device” group with full access. 
Devices that pass only user authentication (wireless 
authentication) and fail machine authentication will be 
placed in the “employee device” group with restricted 
access to the corporate network. 
The group assigned by the RADIUS server can be 
communicated back to a Motorola Wireless controller 
or Access Point using the standard RADIUS protocol, 
and based on the group Role Based Firewall can assign 
appropriate network access controls to the device. 
Machine authentication can be considered if BYOD devices 
are going to be connecting through the corporate Wi-Fi™ 
network 
Fingerprinting 
Device fingerprinting can be used to differentiate a 
corporate-issued device from an employee-owned device, 
but fingerprinting should not be the sole differentiation 
method. Device fingerprinting fails if both the corporate-issued 
device and the employee-owned device are of the 
same type. 
Some of the most popular methods used for classifying 
devices examine the HTTP-user agents, MAC OUI or the 
options in DHCP packets. But these values can be spoofed, 
so there is always a possibility of misidentifying a device 
and allowing unauthorized access to it. 
SSID-based Classification 
A common method of classifying devices is to deploy a 
separate secure SSID for employee-owned devices. This 
method is simple, efficient and flexible and works across a 
wide range of devices. Additionally, implementation isn’t 
dependent on the device OS, OS version, or vendor.
PAGE 6 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
Performance and 
Capacity Control with WiNG 5 
Motorola’s WiNG 5 solution provides built-in RF 
performance and capacity management features that 
ensure Wi-Fi™ networks can accommodate employee-owned 
devices. Features like smart band control and smart 
load balancing ensure optimal distribution of clients across 
the available spectrum. Accelerated multicast means faster 
delivery of video applications. Advanced QoS features like 
bandwidth control and air time fairness ensure the integrity 
of corporate applications. 
IT Strategy 
Before embracing a BYOD policy and method, IT needs to 
have a clear strategy in place that addresses: 
• Which corporate applications can be accessed 
from the employee-owned device 
• How to handle the issue of lost or stolen devices 
• How and when to remotely wipe an employee’s 
device 
• Building a list of employee-owned devices that 
will be supported 
You’ll need to consider these factors carefully in order to 
develop a comprehensive and proactive BYOD strategy 
that addresses all the challenges that are specific to your 
company.
PAGE 7 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
Motorola’s WiNG 5 Solution: Providing BYOD Access while Securing Your Network 
Our WiNG 5 Wireless LAN solution has all the components required to enable secure BYOD in your enterprise. BYOD 
means device heterogeneity and while vast majority of security needs for iOS devices can be met with Apple’s™ native 
mobile device management (MDM) APIs, Android™ and other devices usually require installing a client application. 
Motorola has two solutions to offer for device on-boarding – one is MSP (Mobility Services Platform) and the other is 
through a partnership with Cloudpath to provide a comprehensive solution for BYOD. 
Key features of Motorola’s WiNG 5 solution 
Onboard Captive Portal 
Motorola WiNG 5 solution has a comprehensive set of 
onboard captive portal features that allow customers to set 
up an infrastructure without the need for external servers. 
Key features include: 
• Hosting Captive Portal pages on 
the controller or on the AP. 
• Unique Captive Portal pages for each SSID. 
• Integration with externally-hosted 
Captive Portal pages. 
• HTTPS redirection and capture. 
• Integration of external AAA servers 
to authenticate users. 
• Storage of username and password 
database locally on the controller or AP. 
• Time-based access policies. 
• Time-of-day and day-of-week access policies – this 
can be used to restrict the employee-owned device to 
access the network only during office hours. 
Role Based Firewall 
Role-based Firewall plays a key role in assigning different 
roles to employee-owned devices and corporate-issued 
devices as well as enforcing restricted access rights to 
employee-owned devices. 
WiNG 5 Role-based Firewall is very flexible in defining 
how roles are assigned and can evaluate user or device 
identity, device location, the associated SSID, employed 
encryption and authentication schemes. While using 
Machine Authentication, the roles are assigned based on 
the RADIUS group parameter returned by the Corporate 
AAA server. Here device classification is based on whether 
the device passes Machine Authentication or not. 
We recommend a separate secure SSID for employee 
devices, where roles can be assigned on SSID match 
condition – any device connecting to the corporate SSID 
will be assigned a “corporate-issued-device” role and any 
device connecting to the BYOD SSID will be assigned an 
“employee-owned-device” role. Each role is configured 
with a firewall policy that defines the hosts and networks 
the users are permitted to access. 
Device On-boarding through MSP 
Mobility Services Platform (MSP) is a comprehensive 
mobile device management solution capable of handling 
tens of thousands of devices regardless of the device type, 
operating system and manufacturer. MSP’s automatic 
staging ensures that devices are automatically provisioned. 
The following are the high level end device provisioning 
steps with MSP: 
1. On the MSP, the IT administrator configures the 
Wi-Fi™ network policies specific to your needs, 
including SSID, authentication mechanism (PSK) and 
downloads a bar code that stores information about 
the policy. 
2. The user downloads an MSP agent from the 
Android Market or the App Store depending 
on the device type. 
3. The user scans the barcode (which could be 
distributed via email, posted on a captive portal 
webpage or printed out) through the MSP agent. 
4. The MSP agent configures the end device to 
automatically connect to the secure BYOD Wi-Fi™ 
network. 
Device On-boarding through Cloudpath 
For a BYOD solution to be widely adopted, the ease of on-boarding 
unmanaged employee owned devices is essential. 
Cloudpath’s XpressConnect ensures that employee-owned 
devices are provisioned for the secure wireless network 
quickly and securely. 
Benefits of Cloudpath’s XpressConnect 
• XpressConnect supports a wide variety of end devices 
including Windows™, MAC™, Ubuntu, iOS, and 
Android without placing any restrictions on the device 
type that an employee could use. 
• XpressConnect automatically configures SSIDs for 
WPA-2 Enterprise and WPA2-PSK. 
• XpressConnect can automatically install CA 
certificates and configure 802.1 x profiles to enforce 
server validation. 
• XpressConnect can automatically generate a CSR 
on the client, interact with CA to get the certificate 
issued and automatically installs the certificate on 
the client
PAGE 8 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
BYOD Implementation with Cloudpath 
The below chart provides an overview of the sequence of steps for the BYOD solution. 
GUEST SSID 
OPEN NETWORKING 
1. Motorola’s WiNG 5 APs broadcast three SSIDs – 
a. The first SSID is for the corporate device 
using existing 802.1x-based authentication 
mechanism. 
b. A second open SSID “Guest Access” option 
allows users to connect through their 
employee-owned devices. This SSID is used 
only during the initial phase to download the 
wireless configuration for connecting to the 
BYOD SSID. 
c. A third secure SSID “BYOD” is used to allow 
personal devices to log onto the corporate 
network. 
2. The administrator uses the XpressConnect 
Administrative Console to define the wireless 
network settings, device policies and downloads the 
XpressConnect wizard utility. 
3. The XpressConnect wizard is stored in a local Web 
server. 
4. When the user connects to the Guest SSID and opens 
the browser, the session is automatically redirected to 
a captive portal page that can be hosted either on the 
WiNG 5 AP or on the WiNG 5 Controller. 
Personal device connects 
to open ‘guest’ SSID 
Authentication against 
Captive Portal 
CloudPath Wizard 
configures the end device 
Device migrates to secure 
BYOD SSID 
Role-based Firewall 
applies access control 
1. 
2. 
3. 
4. 
5. 
5. The user enters her username and password which 
is then authenticated against the existing corporate 
Active Directory and AAA – this ensures that only 
devices belonging to valid corporate users are 
registered. 
6. Once the user authenticates successfully against 
the corporate Active Directory, the XpressConnect 
wizard utility configures the employee-owned device 
to connect to the BYOD SSID either through username 
and password or certificate. 
7. If using certificates, then XpressConnect wizard 
automatically contacts the enterprise Certificate 
Authority, generates client certificate and installs the 
certificate on the end device. 
8. Motorola’s Role-based Firewall is configured to 
dynamically assign firewall policies and apply 
differentiated network access rights to these devices. 
XPRESS CONNECT 
WIZARD 
GUEST SSID 
CORPORATE SSID 
BYOD SSID 
BYOD SSID 
802.1FX/PSK 
CORPORATE SSID 
802.1FX-PEAP/TLS 
CAPTIVE 
PORTAL 
ROLE-BASED FIREWALL 
CORPORATE SSID: FULL ACCESS 
BYOD SSID: PARTIAL ACCESS 
GUEST SSID: INTERNET ACCESS 
1. 
2. 
3. 
4. 
5.
PAGE 9 
White paper 
BYOD: On-boarding and Securing 
Devices in Your Corporate Network 
Summary 
Motorola’s WiNG 5 Wireless LAN solution has built-in 
capabilities to provide the wireless infrastructure for 
enabling a safe, secure BYOD environment in your 
enterprise. By partnering with third-party solution 
providers like Cloudpath, we enable you to embrace mobile 
device heterogeneity and not just selective BYOD. 
Motorola’s WiNG 5 Wireless LAN with Cloudpath provides 
a solution that: 
• Enables secure authentication methods – 
either captive portal or 802.1x. 
• Ensures that device classification works for 
all device types. 
• Enables granular access policies for 
employee-owned devices. 
• Protects the corporate network against lost 
or stolen devices. 
• Enables deployment of a BYOD solution and 
on-boarding of unmanaged employee-owned 
devices with minimal IT involvement.
motorola.com/wms 
MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC 
and are used under license. All other trademarks are the property of their respective owners. © 2011 Motorola Solutions, Inc. All rights reserved. 
10/11 GO-29-119

Weitere ähnliche Inhalte

Was ist angesagt?

Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...Peter Daalmans
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefNuno Alves
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Ronni Pedersen
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide DeckOlav Tvedt
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 

Was ist angesagt? (20)

Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck#EVRYWhatsNext EMS Slide Deck
#EVRYWhatsNext EMS Slide Deck
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 

Andere mochten auch

Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003J
 
Wp 80211ac indepth (1)
Wp 80211ac indepth (1)Wp 80211ac indepth (1)
Wp 80211ac indepth (1)J
 
802.11ac su
802.11ac su802.11ac su
802.11ac suJ
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Wp wifi-essentials
Wp wifi-essentialsWp wifi-essentials
Wp wifi-essentialsJ
 
Bp wireless-network-perf
Bp wireless-network-perfBp wireless-network-perf
Bp wireless-network-perfJ
 
October Market Watch is Here !
October Market Watch is Here !October Market Watch is Here !
October Market Watch is Here !Michelle Makos
 
Manualul antrenorului
Manualul antrenoruluiManualul antrenorului
Manualul antrenoruluiIrinuca Iri
 
Tali ikatan dan simpulan
Tali ikatan dan simpulanTali ikatan dan simpulan
Tali ikatan dan simpulanSeyla Ilysm
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 

Andere mochten auch (17)

Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003
 
Waqar
WaqarWaqar
Waqar
 
Wp 80211ac indepth (1)
Wp 80211ac indepth (1)Wp 80211ac indepth (1)
Wp 80211ac indepth (1)
 
802.11ac su
802.11ac su802.11ac su
802.11ac su
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Wp wifi-essentials
Wp wifi-essentialsWp wifi-essentials
Wp wifi-essentials
 
Bp wireless-network-perf
Bp wireless-network-perfBp wireless-network-perf
Bp wireless-network-perf
 
October Market Watch is Here !
October Market Watch is Here !October Market Watch is Here !
October Market Watch is Here !
 
METHODS OF AUDITING
METHODS OF AUDITINGMETHODS OF AUDITING
METHODS OF AUDITING
 
Manualul antrenorului
Manualul antrenoruluiManualul antrenorului
Manualul antrenorului
 
Tali ikatan dan simpulan
Tali ikatan dan simpulanTali ikatan dan simpulan
Tali ikatan dan simpulan
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
SERVICE TAX
SERVICE TAXSERVICE TAX
SERVICE TAX
 
Trade union act, 1926
Trade union act, 1926Trade union act, 1926
Trade union act, 1926
 

Ähnlich wie Byod+ +bring+your+own+device

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistanTariq Mustafa
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 finalBlock Armour
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overviewtibbr
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 

Ähnlich wie Byod+ +bring+your+own+device (20)

Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Finance
FinanceFinance
Finance
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Byod security
Byod security Byod security
Byod security
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 

Kürzlich hochgeladen

Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxTusharBahuguna2
 
Booking open Available Pune Call Girls Kirkatwadi 6297143586 Call Hot Indian...
Booking open Available Pune Call Girls Kirkatwadi  6297143586 Call Hot Indian...Booking open Available Pune Call Girls Kirkatwadi  6297143586 Call Hot Indian...
Booking open Available Pune Call Girls Kirkatwadi 6297143586 Call Hot Indian...Call Girls in Nagpur High Profile
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵anilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdshivubhavv
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Douxkojalkojal131
 
SD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxSD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxjanettecruzeiro1
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
 

Kürzlich hochgeladen (20)

Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
 
Booking open Available Pune Call Girls Kirkatwadi 6297143586 Call Hot Indian...
Booking open Available Pune Call Girls Kirkatwadi  6297143586 Call Hot Indian...Booking open Available Pune Call Girls Kirkatwadi  6297143586 Call Hot Indian...
Booking open Available Pune Call Girls Kirkatwadi 6297143586 Call Hot Indian...
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Basapura ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
 
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcd
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
 
SD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptxSD_The MATATAG Curriculum Training Design.pptx
SD_The MATATAG Curriculum Training Design.pptx
 
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
 
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
 

Byod+ +bring+your+own+device

  • 1. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network
  • 2. PAGE 2 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased productivity, mobility and responsiveness to the workplace while reducing costs. Employees want to use their own devices at work – and employers are starting to see the value in letting them. The movement, called Bring Your Own Device – or BYOD – is taking hold. Adopting the “say no” approach to BYOD is probably unrealistic. Employees will bring these devices whether you support them or not, and their presence on your network without the right security tools for support increases risk of data breaches, data loss and noncompliance. A proactive BYOD strategy increases security and compliance. Many organizations have not yet addressed the technical issues that BYOD brings to the table. For example, is your corporate network and security architecture designed to support unmanaged devices? Whether you’re sitting in the CIO office or manning the support desk, you’ll need to safeguard against security risks and loss of infrastructure control as new, privately-owned devices connect to your networks. Key Challenges of BYOD Devices Because BYODs do not have LAN ports, and the cellular technologies that drive them are not designed for corporate access, the optimal method for connecting devices to the corporate network is Wi-Fi™. A Wi-Fi™ connection is also highly reliable and delivers speed that users crave. But delivering this kind of service has its challenges. In this paper, we’ll consider: • Key threats and challenges that CIO’s face when migrating unmanaged devices onto their corporate networks • Important issues for CIO’s to consider when they are framing policies for BYODs to ensure secure integration with the corporate network • How Motorola’s WiNG 5 Wireless LAN architecture and features help enterprises in deploying a secure BYOD solution
  • 3. PAGE 3 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network CORPORATE-ISSUED Managing Employee Owned Devices Allowing unmanaged devices access to the corporate network without taking the proper precautions can pose huge security risks, introducing the threat of malware – and malware can bring viruses, Trojans, spyware, root kits and other attacks to your network. Enhancing your security architecture as part of a robust BYOD strategy allows BYODs access to sensitive data while removing the threats. NEW DEVICE CORPORATE, PERSONAL, OR GUEST DEVICE? GUEST AUTHENTICATE VLAN FOR INTERNET ACCESS ONLY AUTHENTICATE: SET TO CORPORATE ACCESS. PERSONAL-OWNED QUARANTINE VLAN DEVICE TYPE/OS - Up to revision? - Register to user-authenticate set to limited corporate access, email, etc. IT administrators must be able to identify which devices are corporate-issued and which are employee-owned so that they can differentiate network access privileges for each type of device. Having granular control over network resources that can be accessed from an employee-owned device is a key component to eliminating potential security risks. Consider setting a policy that allows the employee-owned device to access a limited number of applications, such as e-mail and calendar programs, and block access to other Intranet-based applications like finance, human resources or sales. A second challenge from an administrative perspective is how to on-board these employee-owned devices without a labor-intensive registration process so that they connect automatically and securely to the corporate network. Of course, the challenge here is anticipating registration for a host of devices that have different operating systems and manufacturers, as well as various versions, capabilities and limitations. The third challenge is ensuring good network performance and sufficient capacity. You can imagine that the number of Wi-Fi™ devices at your workplace will grow a great deal once you announce your BYOD policy. Don’t forget that the applications that run on these devices require a great deal of bandwidth, as well. Your corporate IT department needs to ensure that the Wi-Fi™ network infrastructure is designed to handle the increased number of Wi-Fi™ devices without a negative impact on network capacity and performance.
  • 4. PAGE 4 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network Wi-Fi™ Design Considerations for BYOD Existing Infrastructure: Corporate SSID + Guest SSID BYOD - Secure Separate SSID/Corporate SSID AUTHENTICATION WLAN DESIGN DEVICE ON-BOARDING IT STRATEGY Plan for Future: Personal computing devices Wi-Fi™ design considerations for IT revolves around five key areas. Wi-Fi Network Design Today, most corporate wireless networks run two different Wi-Fi™ networks – a secure Wi-Fi™ network for corporate devices and an open Wi-Fi™ network for guest devices. The first step in planning a BYOD implementation for your company is to decide whether you want the employee-owned devices to connect to the existing secure corporate Wi-Fi™ network, or if you want to create a separate secure BYOD Wi-Fi™ network for employee-owned devices. Having employee-owned devices connect to a separate Wi-Fi™ network provides a flexible deployment model for corporate IT. It allows employees to choose a security method and frees them from being tied to the established corporate method. In general, many enterprises prefer to deploy a separate secure Wi-Fi™ network for employee-owned devices. ACCESS CONTROL 802.1x - PEAP/TLS Pre Shared Key Captive Portal for registration and auto device configuration Role-based Firewall Access Control policies Authentication Selecting the right authentication method is critical because employee-owned devices should access only the appropriate corporate applications – it’s up to you to decide which applications you want employees to access. The method you choose should be easy to deploy and work across a wide range of devices. The most widely adopted authentication methods include: Captive Portal Also known as “guest access” or a “hotspot”, Captive Portal allows wireless infrastructure to segment the traffic into a separate VLAN/network. Easy to set up, it can integrate with the existing corporate Active Directory user database and works with any device as it is based on a standard browser. The biggest drawback is that wireless communication occurs on an unsecured network, which is not recommended for corporate networks. However, it is suitable for a guest network requiring internet access. WPA / WPA-2 PSK (Pre Shared Keys) Allows secure wireless communication, but the shared key needs to be securely distributed to all end devices. Since these keys are stored permanently, lost or stolen devices can open the door for unauthorized access.
  • 5. PAGE 5 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network 802.1x – Username/Password or Certificates The most popular authentication method deployed in corporate Wi-Fi™ networks for corporate devices, 802.1x can either be based on usernames and passwords or can be based on certificates. 802.1x is very secure and can integrate with existing corporate Active Directory and domain control can be enforced. Many enterprises do not have the infrastructure for an 802.1x-based authentication mechanism and prefer to use PSK. For such enterprises, Motorola’s WiNG 5 architecture provides dual layer of security by combining captive portal functionality on top of PSK. This ensures that an employee-owned device that wants to enter your wireless network will require keys and will also need to authenticate through the captive portal every time the user logs onto the network. This method imposes a bit more login time on the part of the user, but it represents the best trade-off between usability and security. Welcoming Devices On-board Proper device on-boarding should seamlessly adopt employee-owned devices onto your corporate network with minimal IT intervention and effort. When an employee tries to register their personal device with your corporate network, the infrastructure validates user credentials and then binds that user’s network access and privilege data. Once registered, the end device should be configured to connect to your secure Wi-Fi™ network with the appropriate application and resource access. Access Control One of the key components of a successful BYOD implementation is the ability to distinguish a corporate-issued device from an employee-owned device and assign the appropriate access to each type of device. Motorola’s WiNG 5 Role-Based Firewall is an integral component of the solution that applies roles to devices and enforces differential access rights to each role. Multiple parameters can be used to assign a role. Below are some of the common methods used to classify devices. Machine Authentication It’s more than likely that your company has corporate-issued Windows™-based devices that will be part of the domain and will join the domain each time they access the network. Non-corporate Windows™ devices as well as non-Windows™-based devices can never join the domain. It is important to create a policy that can be configured in the corporate RADIUS server which assigns groups to the device based on whether or not the device has passed machine authentication. Any device that passes both machine authentication and user authentication can be assigned to the “corporate device” group with full access. Devices that pass only user authentication (wireless authentication) and fail machine authentication will be placed in the “employee device” group with restricted access to the corporate network. The group assigned by the RADIUS server can be communicated back to a Motorola Wireless controller or Access Point using the standard RADIUS protocol, and based on the group Role Based Firewall can assign appropriate network access controls to the device. Machine authentication can be considered if BYOD devices are going to be connecting through the corporate Wi-Fi™ network Fingerprinting Device fingerprinting can be used to differentiate a corporate-issued device from an employee-owned device, but fingerprinting should not be the sole differentiation method. Device fingerprinting fails if both the corporate-issued device and the employee-owned device are of the same type. Some of the most popular methods used for classifying devices examine the HTTP-user agents, MAC OUI or the options in DHCP packets. But these values can be spoofed, so there is always a possibility of misidentifying a device and allowing unauthorized access to it. SSID-based Classification A common method of classifying devices is to deploy a separate secure SSID for employee-owned devices. This method is simple, efficient and flexible and works across a wide range of devices. Additionally, implementation isn’t dependent on the device OS, OS version, or vendor.
  • 6. PAGE 6 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network Performance and Capacity Control with WiNG 5 Motorola’s WiNG 5 solution provides built-in RF performance and capacity management features that ensure Wi-Fi™ networks can accommodate employee-owned devices. Features like smart band control and smart load balancing ensure optimal distribution of clients across the available spectrum. Accelerated multicast means faster delivery of video applications. Advanced QoS features like bandwidth control and air time fairness ensure the integrity of corporate applications. IT Strategy Before embracing a BYOD policy and method, IT needs to have a clear strategy in place that addresses: • Which corporate applications can be accessed from the employee-owned device • How to handle the issue of lost or stolen devices • How and when to remotely wipe an employee’s device • Building a list of employee-owned devices that will be supported You’ll need to consider these factors carefully in order to develop a comprehensive and proactive BYOD strategy that addresses all the challenges that are specific to your company.
  • 7. PAGE 7 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network Motorola’s WiNG 5 Solution: Providing BYOD Access while Securing Your Network Our WiNG 5 Wireless LAN solution has all the components required to enable secure BYOD in your enterprise. BYOD means device heterogeneity and while vast majority of security needs for iOS devices can be met with Apple’s™ native mobile device management (MDM) APIs, Android™ and other devices usually require installing a client application. Motorola has two solutions to offer for device on-boarding – one is MSP (Mobility Services Platform) and the other is through a partnership with Cloudpath to provide a comprehensive solution for BYOD. Key features of Motorola’s WiNG 5 solution Onboard Captive Portal Motorola WiNG 5 solution has a comprehensive set of onboard captive portal features that allow customers to set up an infrastructure without the need for external servers. Key features include: • Hosting Captive Portal pages on the controller or on the AP. • Unique Captive Portal pages for each SSID. • Integration with externally-hosted Captive Portal pages. • HTTPS redirection and capture. • Integration of external AAA servers to authenticate users. • Storage of username and password database locally on the controller or AP. • Time-based access policies. • Time-of-day and day-of-week access policies – this can be used to restrict the employee-owned device to access the network only during office hours. Role Based Firewall Role-based Firewall plays a key role in assigning different roles to employee-owned devices and corporate-issued devices as well as enforcing restricted access rights to employee-owned devices. WiNG 5 Role-based Firewall is very flexible in defining how roles are assigned and can evaluate user or device identity, device location, the associated SSID, employed encryption and authentication schemes. While using Machine Authentication, the roles are assigned based on the RADIUS group parameter returned by the Corporate AAA server. Here device classification is based on whether the device passes Machine Authentication or not. We recommend a separate secure SSID for employee devices, where roles can be assigned on SSID match condition – any device connecting to the corporate SSID will be assigned a “corporate-issued-device” role and any device connecting to the BYOD SSID will be assigned an “employee-owned-device” role. Each role is configured with a firewall policy that defines the hosts and networks the users are permitted to access. Device On-boarding through MSP Mobility Services Platform (MSP) is a comprehensive mobile device management solution capable of handling tens of thousands of devices regardless of the device type, operating system and manufacturer. MSP’s automatic staging ensures that devices are automatically provisioned. The following are the high level end device provisioning steps with MSP: 1. On the MSP, the IT administrator configures the Wi-Fi™ network policies specific to your needs, including SSID, authentication mechanism (PSK) and downloads a bar code that stores information about the policy. 2. The user downloads an MSP agent from the Android Market or the App Store depending on the device type. 3. The user scans the barcode (which could be distributed via email, posted on a captive portal webpage or printed out) through the MSP agent. 4. The MSP agent configures the end device to automatically connect to the secure BYOD Wi-Fi™ network. Device On-boarding through Cloudpath For a BYOD solution to be widely adopted, the ease of on-boarding unmanaged employee owned devices is essential. Cloudpath’s XpressConnect ensures that employee-owned devices are provisioned for the secure wireless network quickly and securely. Benefits of Cloudpath’s XpressConnect • XpressConnect supports a wide variety of end devices including Windows™, MAC™, Ubuntu, iOS, and Android without placing any restrictions on the device type that an employee could use. • XpressConnect automatically configures SSIDs for WPA-2 Enterprise and WPA2-PSK. • XpressConnect can automatically install CA certificates and configure 802.1 x profiles to enforce server validation. • XpressConnect can automatically generate a CSR on the client, interact with CA to get the certificate issued and automatically installs the certificate on the client
  • 8. PAGE 8 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network BYOD Implementation with Cloudpath The below chart provides an overview of the sequence of steps for the BYOD solution. GUEST SSID OPEN NETWORKING 1. Motorola’s WiNG 5 APs broadcast three SSIDs – a. The first SSID is for the corporate device using existing 802.1x-based authentication mechanism. b. A second open SSID “Guest Access” option allows users to connect through their employee-owned devices. This SSID is used only during the initial phase to download the wireless configuration for connecting to the BYOD SSID. c. A third secure SSID “BYOD” is used to allow personal devices to log onto the corporate network. 2. The administrator uses the XpressConnect Administrative Console to define the wireless network settings, device policies and downloads the XpressConnect wizard utility. 3. The XpressConnect wizard is stored in a local Web server. 4. When the user connects to the Guest SSID and opens the browser, the session is automatically redirected to a captive portal page that can be hosted either on the WiNG 5 AP or on the WiNG 5 Controller. Personal device connects to open ‘guest’ SSID Authentication against Captive Portal CloudPath Wizard configures the end device Device migrates to secure BYOD SSID Role-based Firewall applies access control 1. 2. 3. 4. 5. 5. The user enters her username and password which is then authenticated against the existing corporate Active Directory and AAA – this ensures that only devices belonging to valid corporate users are registered. 6. Once the user authenticates successfully against the corporate Active Directory, the XpressConnect wizard utility configures the employee-owned device to connect to the BYOD SSID either through username and password or certificate. 7. If using certificates, then XpressConnect wizard automatically contacts the enterprise Certificate Authority, generates client certificate and installs the certificate on the end device. 8. Motorola’s Role-based Firewall is configured to dynamically assign firewall policies and apply differentiated network access rights to these devices. XPRESS CONNECT WIZARD GUEST SSID CORPORATE SSID BYOD SSID BYOD SSID 802.1FX/PSK CORPORATE SSID 802.1FX-PEAP/TLS CAPTIVE PORTAL ROLE-BASED FIREWALL CORPORATE SSID: FULL ACCESS BYOD SSID: PARTIAL ACCESS GUEST SSID: INTERNET ACCESS 1. 2. 3. 4. 5.
  • 9. PAGE 9 White paper BYOD: On-boarding and Securing Devices in Your Corporate Network Summary Motorola’s WiNG 5 Wireless LAN solution has built-in capabilities to provide the wireless infrastructure for enabling a safe, secure BYOD environment in your enterprise. By partnering with third-party solution providers like Cloudpath, we enable you to embrace mobile device heterogeneity and not just selective BYOD. Motorola’s WiNG 5 Wireless LAN with Cloudpath provides a solution that: • Enables secure authentication methods – either captive portal or 802.1x. • Ensures that device classification works for all device types. • Enables granular access policies for employee-owned devices. • Protects the corporate network against lost or stolen devices. • Enables deployment of a BYOD solution and on-boarding of unmanaged employee-owned devices with minimal IT involvement.
  • 10. motorola.com/wms MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. © 2011 Motorola Solutions, Inc. All rights reserved. 10/11 GO-29-119