Intelligent Tech Channels Issue 02 | Page 45

INTELLIGENT MOBILE TECHNOLOGY their day and work with multiple devices.
With this model, laptops can be given more rights than smartphones based on device type, for example. Policy management takes all those factors into account and dynamically enforces which resources can be accessed.
In addition, today’ s policy management systems let users configure their own devices for secure Wi-Fi or wired connectivity. Workflows that include mobile device management and enterprise mobility management, makes it easy to detect if a device is company issued or BYOD.
This sort of security management transition cannot be done in a firehose fashion, security professionals agree that a phased approach is the smartest way to move from legacy to centralised policy management. IT departments can then ensure that highly mobile workers get seamless access to the applications, printers and network services they are authorised to use, no matter where they are or what device they are using.
IT professionals have been tested by the BYOD trend with both internal users and network guests. Managing the onboarding process of everyone’ s personal devices can strain IT and helpdesk resources, and if not properly handled, can also create security problems.
Robust management platforms allow for any Windows, Mac OS X, iOS, Android, Chromebook and Ubuntu devices to be automatically onboarded via a user-driven, self-guided portal. Required SSIDs, 802.1X settings and necessary device certificates are then automatically configured on authorised devices.
By working with unique device certificates, users do not need to enter login credentials repeatedly throughout the day, or worry as much about password theft when connected to guest networks. Menu-driven capabilities ensure the rapid revocation and deletion of certificates for specific mobile devices if a user leaves an organisation or if the device is lost or stolen.
The BYOD challenges do not just apply to internal users. Any visitor, guest, customer, partner or other external third-party, will
They seek security management that is both adaptive to how people work and is easily customised
arrive with at least one device that requires network access – wired or wireless. Good security management requires a simple model that automates and simplifies the provisioning of network access for guests, but also provides expansive security features that keep data, computing resources and other users safe.
Self-registration lets guests create their own log-in credentials, which are delivered via printed badges, SMS text or email. Credentials can be stored for specific periods of time and set to expire automatically. Guest traffic on the network should also be configured to run separately from enterprise traffic.
Today’ s most robust security management platforms allow guest portals to be customised with options like advertising and local language support. Guest policy management must also include the ability to set bandwidth limitations on guest sessions to maintain service-level agreements and robust throughput for all users.
Network access management systems that integrate with next-generation, applicationaware firewalls for additional protection against non-http traffic and content filtering that prevents access to inappropriate or offensive websites is also recommended.
Prevention is especially good medicine for the security of enterprises and their datacenters. IT must have the means to perform endpoint health checks to ensure that laptops are fully compliant with internal requirements, which checks for the latest patches and updates before they are allowed to connect.
In addition to system-wide, persession protection, enterprises should be able to specify whether to allow or deny capabilities like peer-to-peer applications or USB storage devices. Administrator dashboards make it easy to identify noncompliant devices, users, and the reasons for non-compliance.
Access can be denied if storage is not encrypted- this also gives IT leverage with users to ensure that offending laptops get updated as needed. Endpoints that are not in compliance can be automatically remediated or quarantined with today’ s security management platforms.
These sorts of security functions are no longer just nice to have, they are essential for today’ s competitive business. And with the advent of cloud computing and an explosion of IoT devices, robust security management is essential for enterprises. End-users, accustomed to high levels of performance, easy access and self-service, expect the same of business networks.
Security platforms that integrate policy management with authentication, authorisation and accounting will lay the groundwork for more robust computing and IT-fueled productivity. And they will keep networks, devices, data and users safe in the process.
Ahmed Rezk is Channel Systems Engineering Manager, Middle East and Turkey at Aruba
45