Solved

Wireless Network / SEcurity for WArehouse

Posted on 2015-01-05
4
117 Views
Last Modified: 2015-01-12
Hi Gurus,
I would like to have secured solution for a wireless solution that would only access certain barcode reader in the warehouse. To ensure maximum security, i am considering the below
1. Access Point with Active Rogue SCanner
2. Wireless LAN Controller
3. Appliance / SW for Authentication
4. Appliance / SW to detect rogue and blacklist them using policies
5. Profiling / Posturing
6. MDM Software to control the barcode readers
7,Any software for Mobile Device Security ( Such as DLP etc) from McaFee for eg

I do have some doubt on point 6 and 7, as the handhelds will be windows 6.5 , will it be able to monitor the device through MDM Software. Also can the hardwares be controller through McaFee Mobile Security.

Regards,

SID
0
Comment
Question by:infiniti7181
  • 2
  • 2
4 Comments
 
LVL 45

Expert Comment

by:Craig Beck
ID: 40532332
This just screams Cisco WLC and ISE.
0
 

Author Comment

by:infiniti7181
ID: 40532813
Hi ,
Thanks for the input . In fact the points 1 to 5 will be covered by Cisco with WLC , ISE , MSE etc , but my concern is with point 6 and 7, as i beleive cisco doesnt have the feature and need to integrate with third party.

For eg : for MDM vendors like Airwatch
for mobile security vendors like McAFee Mobile Security etc

Any ideas

SID .
0
 

Author Comment

by:infiniti7181
ID: 40534870
Hi ,
Any advices, related with Barcode MDM and Mobile Security related vendors .

Regards,
Aaron
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40535208
I think your best bet would be AirWatch.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now