Solved

Wireless Network / SEcurity for WArehouse

Posted on 2015-01-05
4
122 Views
Last Modified: 2015-01-12
Hi Gurus,
I would like to have secured solution for a wireless solution that would only access certain barcode reader in the warehouse. To ensure maximum security, i am considering the below
1. Access Point with Active Rogue SCanner
2. Wireless LAN Controller
3. Appliance / SW for Authentication
4. Appliance / SW to detect rogue and blacklist them using policies
5. Profiling / Posturing
6. MDM Software to control the barcode readers
7,Any software for Mobile Device Security ( Such as DLP etc) from McaFee for eg

I do have some doubt on point 6 and 7, as the handhelds will be windows 6.5 , will it be able to monitor the device through MDM Software. Also can the hardwares be controller through McaFee Mobile Security.

Regards,

SID
0
Comment
Question by:infiniti7181
  • 2
  • 2
4 Comments
 
LVL 45

Expert Comment

by:Craig Beck
ID: 40532332
This just screams Cisco WLC and ISE.
0
 

Author Comment

by:infiniti7181
ID: 40532813
Hi ,
Thanks for the input . In fact the points 1 to 5 will be covered by Cisco with WLC , ISE , MSE etc , but my concern is with point 6 and 7, as i beleive cisco doesnt have the feature and need to integrate with third party.

For eg : for MDM vendors like Airwatch
for mobile security vendors like McAFee Mobile Security etc

Any ideas

SID .
0
 

Author Comment

by:infiniti7181
ID: 40534870
Hi ,
Any advices, related with Barcode MDM and Mobile Security related vendors .

Regards,
Aaron
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40535208
I think your best bet would be AirWatch.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question