Think security is the only thing you have to pay attention to if your organization has a BYOD policy? You’re wrong. The network has to be honed as well
For security managers, there likely isn’t an acronym that makes knees shake more than BYOD. For them, ‘bring your own device’ means ‘bring us your security headaches.’
But as Lee Badman writes in Network Computing, there are also network implications for BYOD because of the increasing and varied number of devices connecting to the system. So he offers three tips for overseeing the network side of things.
(Mobile users image from Shutterstock)
“The influx of BYOD clients has a ripple effect that runs through wireless controllers, ACLs, switch configurations, DHCP pools, and the training of support staff,” he writes.
These tips are worth reviewing and being acted on.Related Download
Optimized Security and Simplicity for Complex Distributed Enterprise Networks
This IDC Analyst Connection looks at the the benefits of using a UTM platform integrated with network connectivity and how it will save the enterprise money, reduce the number of vendors' products needed to be purchased, improve the communications between devices, offer the opportunity for organizations to deploy more sophisticated capabilities, and vastly improve security.