Premium Content

Access "Networking for BYOD: No single solution"

Rivka Little Published: 06 Dec 2012

Leo Pickford, IT manager of ArchitecturePLB in London, learned two things about a bring your own device (BYOD) environment: first, there is no all-in-one technology solution; and second, allowing personal devices onto the corporate network boils down to mitigating risk. It’s not that there aren’t a plethora of BYOD technologies available. In fact, vendors push solutions that promise features ranging from mobile device management (MDM) to mobile network access control. But in most cases, these technologies address only portions of the overall picture. Specifically when it comes to networking for a BYOD environment, there are a myriad of challenges that include perimeter security, bandwidth management and application optimization. A real BYOD networking solution could require an infrastructure redesign to enable application- and user-aware access control and bandwidth management. For ArchitecturePLB, which has two offices and 60 employees, a complete network redesign is not an option. So Pickford has taken on one BYOD challenge at a time using a patchwork of ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Is virtual desktop infrastructure the answer? by Nathan Eddy

      IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.

    • Networking for BYOD: No single solution by Rivka Gewirtz Little

      An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.

    • NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo

      Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.

    • Mobile device security best practices for BYOD by Lisa Sampson, Feature Writer

      BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."

More Premium Content Accessible For Free

  • The cloud on the networking horizon
    cloud_networking_horizon.png
    E-Handbook

    This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in ...

  • Discover the next generation of mobile application performance management
    netevo_1014.png
    E-Zine

    Traditional application performance management (APM) tools have given network managers little, if any, visibility into what causes performance ...

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...