Protecting Your Network in a BYOD Environment

By Bob Violino Print this article Print
protecting network from BYOD

Allowing employees to use their personal mobile devices to access the corporate network can increase productivity and morale, but it also increases risks.

Once the WLAN deployment is complete, it will include more than 1,000 access points. By allowing FIT to manage network policies, securely onboard and manage devices, and admit guest users, ClearPass will enable the institute to accommodate BYOD, while improving the security of the wireless network. It will also allow the institute to continue building on and improving its instructional programs, while providing all of its network users with secure network access, Chottiner says.

Offering Employees Two Mobile Options

Another organization that's heavily involved in BYOD is tax and consulting firm PwC in New York. The firm has a large mobile environment that consists of about 37,000 iOS devices, 5,500 Android devices and 2,300 products that use other operating systems. A huge majority of these are owned by employees, says Philip Garland, U.S. CIO at PwC.

The company offers two mobile options for employees, Garland says. One is an email, calendar and contacts option delivered through a sandbox application that separates personal and company information. The second, for iOS devices, is an MDM platform that enables the use of native email, calendar and contacts via corporate WiFi/VPN network access.

The options allow partners and staff to choose the level of business integration they need for their device.

"PwC places its fully managed BYOD devices on a separate service set identifier for wireless connectivity in its offices," Garland says. "This SSID is deployed to all offices globally to allow for global mobility. We use the same level of security for this network as we do with our laptops. For devices running a sandbox solution or no management at all, they can connect to the PwC Guest WiFi network with Internet connectivity only."

For managed devices in the BYOD program, the IT department has worked with the security people at PwC to initiate safeguards and processes that make it simple for users to enroll their devices—and for managers to make sure that specific devices are associated with the right user credentials and have sufficient safeguards.

As users enroll devices in the firm's MDM platform, they're taken through a step-by-step process to configure devices, Garland says. The process includes identifying users, identifying devices and providing credentials to the device.

This article was originally published on 2014-06-27

Bob Violino is a Baseline contributing writer and editorial director at Victory Business Communications.

eWeek eWeek

Have the latest technology news and resources emailed to you everyday.