BYOD networking guide: WLAN management and access policies

BYOD networking guide: WLAN management and access policies

It'll take new WLAN management strategies and BYOD policies to tackle the challenges that arise when personal devices connect to the network en masse.

Many organizations today are adopting Bring Your Own Device (BYOD) policies, allowing employees to connect to the corporate network and conduct business with their own personal mobile devices. However, this is placing considerable strain on traditional network architectures and WLAN management strategies as companies struggle to meet rapidly changing security, capacity, bandwidth and performance requirements.

This five-part guide will help organizations learn how to adopt new WLAN management strategies and institute BYOD policies for access control in order to ensure network performance and provide secure connectivity for mobile users.

Table of contents:

NAC technology evolves to enforce BYOD policies

With so many workers today connecting to their corporate network with their own smartphones and tablets, network access control (NAC) technology is experiencing somewhat of a resurgence. Vendors are now rolling out new NAC features that help enforce BYOD policies for secure access. But there are important variations in what the different vendors are offering. This tip includes a brief overview of the evolution of NAC technology, a description of the three general categories of NAC vendors, some key differences between specific vendors' offerings, and the most important NAC features to consider for BYOD environments and WLAN management.

Read this tip on NAC for BYOD.

Provisioning WLAN access for BYOD requires integrated tools

Many organizations are faced with a dilemma when it comes to BYOD and WLAN access: They don't have the resources to manually configure hundreds of personal devices. But asking every employee to configure their own device will likely result in too many security issues, operational errors and management headaches. In this piece on WLAN access for BYOD, we outline tools that help automate personal device configuration while taking into consideration BYOD policies and strict WLAN access rules.

Read this tip on tools for WLAN access provisioning for BYOD.

UPenn tackles BYOD WLAN access

The University of Pennsylvania overcame its WLAN connectivity and bandwidth limitations by building a bigger network and then implementing a combination of tools for auto-provisioning and network troubleshooting.

Read this case study to learn how the university tackled WLAN access for BYOD.

BYOD WLAN troubleshooting strategies

When it comes to Bring Your Own Device (BYOD) policies, many organizations prudently focus on security and access policy, but too often they neglect WLAN troubleshooting initiatives. Subsequently, they find themselves fixing problems after they occur instead of proactively. But proactive troubleshooting can help enterprises detect early signs of trouble and eliminate issues before they become too burdensome or expensive.

In this tip, learn about proactive WLAN troubleshooting strategies.

BYOD challenges that lurk beyond network security

Security may be the number one concern when it comes to BYOD adoption, but a number of other WLAN management challenges abound. This tip delves into some common BYOD challenges, the need to scale networks and how to get employees on board with BYOD policies.

Read more about BYOD networking challenges.