successful byod: scalable, secure simple
Post on 14-Sep-2014
472 views
DESCRIPTION
BYOD is getting more complex by the day and security concerns are a top priority for organizations of any size and across all industries. And when it comes to implementation, simplicity and scalability are top-of-mind. -Scalability BYOD is unpredictable. Today’s requirements are tomorrow’s problems. Before deploying, it’s critical to understand how all the components of your rollout will interact and scale as demands inevitably change. -Security Connectivity and security can make or break your BYOD rollout. Not only does your Wi-Fi need to work, it also needs to perform to the demands of your users. In doing so, it must also ensure the security of your network and access to your corporate assets, as well as compliance with industry-specific regulations. -Simplicity BYOD, by its nature, requires a technology ecosystem that’s integrated and easy to deploy, manage and analyze. Register for or view the full webinar: http://www2.bradfordnetworks.com/l/5632/2013-08-25/v1lw1?stk=XRTRANSCRIPT
Bradford NetworksVincent MaVP, Business Development
XirrusKowshik Bhat Director, Product Marketing
AirwatchAndrew BerenatoTechnology Partner Integration
© 2013 Bradford Networks. All rights reserved.
Agenda
Trends and Challenges Facing IT
Joint AirWatch, Bradford Networks and Xirrus Solution:
–Mobile Device Management–Network Access Control–Optimized W-Fi Network
Success Story
Summary
2
© 2013 Bradford Networks. All rights reserved.
Market Trends
© 2013 Bradford Networks. All rights reserved.
Today’s BYOD Challenges
CxO
• Enable BYOD
• Compliance
• Balance Security vs. Access
• Balance Risk/Cost
Users
• Complex access process
• Need Flexibility
• Maintain Privacy
• Need predictable performance
IT Management
• Complex point solutions
• Difficult to enforce policy
• Easy to Manage & Support
© 2013 Bradford Networks. All rights reserved.
Day in the Life of IT Supporting BYOD
5
User
Employee attempts to
access wireless network
MDMMDM NACNAC WLANWLAN
Is the device safe
Deny or allow access based on device/app status
What are the right privileges
Restrict access based on context
Is the user productive?
Control user experience based on context
© 2013 Bradford Networks. All rights reserved.
Solution Benefits
6
Simple•Integrated & automated solution•Proven in real customer environments•Easily manage diverse end points
Secure•Device posture checking•Context based access•Device finger printing
Scalable•AirWatch true Mutli-Tenant Architecture•Bradford scales for any enterprise environment/# of devices•Xirrus grow as you go wireless network
© 2013 Bradford Networks. All rights reserved.
End-to-End BYOD Solution
Enterprise SSIDFull Access
Guest SSIDInternet Only
Blocked Devices
Enterprise Resources
Network Sentry
Internet
Captive PortalClassify User/Device/Location
Enforce Policies
Xirrus Wireless AP/Array MDM
AAAAD/LDAP
802.1x
Open or PSK
Restricted Access
EmailAppsDatabases
• Visibility• Policy Manager• Automation / Control• Compliance
XMS
Mobility Device Management
© 2013 Bradford Networks. All rights reserved.
Join Us
• Webinar: http://www2.bradfordnetworks.com/l/5632/2013-08-25/v1lw1?stk=XR