Solved

BYOD - Bring in Your Own Device

Posted on 2011-09-26
9
398 Views
Last Modified: 2012-05-12
Do any one of you have worked on the concept of the BYOD - Bring in Your Own Device.
If any one has any details or any one has deployed it could you please share the same.
I would like to know how it works.
0
Comment
Question by:SrikantRajeev
  • 3
  • 2
  • 2
  • +1
9 Comments
 
LVL 26

Accepted Solution

by:
Soulja earned 167 total points
ID: 36709574
0
 
LVL 26

Expert Comment

by:Soulja
ID: 36709582
It basically sounds like the idea of companies allowing their employees to bring their personal devices to work in order to connect to the corporate network. Personally, it a bad idea to me. At most I would allow these devices on a "Guest" portion of the network, that doesn't touch corporate.
0
 
LVL 26

Expert Comment

by:Fred Marshall
ID: 36711223
Everything that I've read sounds like the tech companies want a piece of the action.  Maybe start with some fundamentals and you can get further:

1) Assume that folks WILL bring in their own devices.
2) Assume that these devices are totally uncontrollable.  Beware if you assume anything else!
3) Consider providing public internet-based access to everything - with security of course.  

So, then #3 becomes the challenge.  How do we get our employees on or into the company network while maintaining security?  VPNs come to mind.  It doesn't really matter WHERE they are sitting does it?  In their office or down at the coffee shop.  So treat the office like the coffee shop.

This doesn't eliminate security concerns but it seems to me to "unwind" the complexities and leans to known technologies.

Then you still have to worry about devices and logins being compromised: stolen, etc.  How do you deal with that?  You probably already are dealing with that.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 26

Assisted Solution

by:Fred Marshall
Fred Marshall earned 166 total points
ID: 36711228
Then maybe you don't provide access to "everything" in this manner, eh?
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 36960292
juniper has new solution for this.
The website does not provide more details like how it works.
Has any one know more about its product ?
0
 
LVL 2

Assisted Solution

by:Flightless
Flightless earned 167 total points
ID: 37125248
Ok so BYOD can mean many things.....  I guess what I am seeing the most at the moment is bring your own smartphone to work.

The trouble with BYOD and smartphones is that it gives companies with a massive challenge of supporting multiple operating systems (Apple iOS, RIM Blackberry, Symbian, Android and Windows Mobile). So the first thing to look for when looking for a BYOD solution is: does it support all of the end devices/OS that I need to support?

Junipers Pulse solution provides an SSL VPN for all of the OS listed above as well as for more traditional end point devices such as windows laptops. However Juniper have been smart with their acquisition of SMobile late in 2010. The integrated Juniper Pulse client provides not only the Juniper SSL VPN but it provides end point anti-malware and some other stuff too which is very important if you are looking to mobilise your corporate email/data. On top of all of that the Juniper SSL VPN appliance can perform compliance checking to ensure that the end point security stuff is actually running.
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 37199138
has any one had deployed this solution in an enterprise company
0
 
LVL 2

Expert Comment

by:Flightless
ID: 37200286
Yes. For many customers.
0
 
LVL 1

Author Closing Comment

by:SrikantRajeev
ID: 37277885
Thanks
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Internet Service Provider 3 55
Slow Internet Connection 9 57
Cisco 2960 unable to add SFP modules to device 9 68
rajdeep0081@hotmail.com 3 73
Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question