Column

In BYOD networking, no single solution

Ezine

This article can also be found in the Premium Editorial Download "Network Evolution: BYOD challenges that lurk beyond network security."

Download it now to read this article plus other related content.

Rivka Gewirtz Little

Too often BYOD networking challenges are boiled down to security, but that's only a fraction of the battle. As personal devices flood the enterprise, network managers are learning they may need to rearchitect their wireless LANs, find new troubleshooting tools, and most importantly convince C-level executives to fund these projects.

We start this issue of The Network Evolution ezine with a story that examines the BYOD challenges outside of security. We didn't expect to hear that personnel and management issues would play such a central role. In his piece, “BYOD challenges that lurk beyond network security,” news director Shamus McGillicuddy reports that too often executive management would rather ban all devices than pay for a BYOD strategy. Yet business divisions within the organization later find ways to circumvent these bans, creating havoc for IT. On the flip side of this issue, McGillicuddy learned that once management does sign on to a BYOD plan, some employees resist the new policy because of the privacy issues linked to IT managing personal devices.

Once these issues shake out – and they inevitably will – network engineers will find themselves desperately trying to troubleshoot an overloaded wireless LAN, reports wireless expert Lisa Phifer in her piece ″WLAN troubleshooting strategies for BYOD.” Phifer recommends using a mix of proactive and reactive tools to optimize device performance on the network. The goal would be to get as much performance as possible out of the WLAN before IT shops are forced to upgrade the whole network.

All of this is not to say that BYOD security shouldn't be taken seriously. After all, there is no silver-bullet solution to BYOD security and access control. In the article “Four IT shops with differing BYOD network security strategies,” contributor David Geer interviews four educational institutions with totally distinct strategies, but all of them integrated a spectrum of tools that ranged from mobile device management applications to out-of-band network management systems.

The underlying theme in all of these stories seems to be that there is no single solution to BYOD management and security. Now more than ever, engineers must be innovative in network design and management strategies. We hope some of this information will help them in this process.

 

This was first published in January 2013

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: