byod guide
DESCRIPTION
BYOD Guide. Created using iThoughts [...]. BYOD Guide. Introduction. Who is this for? Implications of BYOD Implications of no BYOD What is your policy? Authentication End Point Security Access Control. Discovery. Type/Class of Device Class of Device IT Managed User Managed - PowerPoint PPT PresentationTRANSCRIPT
![Page 2: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/2.jpg)
BYOD Guide
![Page 3: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/3.jpg)
Introduction
• Who is this for?• Implications of BYOD• Implications of no BYOD• What is your policy?– Authentication– End Point Security– Access Control
![Page 4: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/4.jpg)
Discovery
• Type/Class of Device– Class of Device• IT Managed• User Managed
– Type of Device• Laptop• Tablet• Smart Phone• Other
![Page 5: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/5.jpg)
Discovery
• Type/Class of User– Known• Super User• Departmental User• Contractor
– Unknown• Contractor• Guest
![Page 6: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/6.jpg)
Discovery
• Location– Office– Home– Public Wi-Fi Hote Spot– Hotel– Non-corporate Office
• Time of Day/Day of Week
![Page 7: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/7.jpg)
Discovery
• Bandwidth Allocation– Per Device– Per User– Per Application
• Application/Service
![Page 8: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/8.jpg)
Telephony Support
• Type/Class of Device• Features– Single Number– Presence– Mobility
![Page 9: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/9.jpg)
Define Access Policies
• Security Policy Alignment• Network Services– Known User• HR Involvement
– New Employee Policy– Leavers Policy
• IT Managed Device– Laptop– Tablet
![Page 10: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/10.jpg)
Define Access Policies
• User Managed Device– Corporate Location– Home– Other Location
– Unknown User• User Managed Device
– Corporate Location
• Telephony– Corporate Handset
![Page 11: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/11.jpg)
Define Access Policies
• Staff• Contractor
– Personal Handset• Staff• Contractor
– HR Involvement• New Employee Policy• Leavers Policy
![Page 12: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/12.jpg)
Design, Specification & Deployment
• Goals - what do you want to achieve?• Design & Architecture• Resilience/Redundancy• Integration• Define User Groups• Profile - what can we find out about the
device?• Posture - what are we checking?
![Page 13: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/13.jpg)
Design, Specification & Deployment
• Enforcement - what action do we take?• Implementation - how do we install?• Setting Expectations• Determine Timescales• Scheduling• User Group Regression Plans• Proof of Concept
![Page 14: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/14.jpg)
Design, Specification & Deployment
– Users– User Devices– Objectives– Pre-test– Success Criteria– Stakeholders– Sign Off
![Page 15: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/15.jpg)
Management
• On Boarding– IT Staff Impact– Automation
• Monitoring– Diagnostics– Logging– Compliance and Auditing
![Page 16: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/16.jpg)
Management
– Reporting– Alarms– Incident Response– Revocation
• Security Policy Aligment– Users– IT Managed Device
![Page 17: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/17.jpg)
Management
– User Managed Device– HR Implications– Change Management– Security Audit– Review Process
![Page 18: BYOD Guide](https://reader033.vdocuments.net/reader033/viewer/2022061519/56815b29550346895dc8eb5a/html5/thumbnails/18.jpg)
Next Steps
• http://www.astro.co.uk/byod/byod-resource• Call Marie on +44 (0)1322 610 178• Email Marie - [email protected]