Your SlideShare is downloading. ×
Deliver unparalleled value with BYOD - business white paper
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Deliver unparalleled value with BYOD - business white paper


Published on

Read this white paper to know how you can unleash the full potential of mobility—greater productivity, simplicity and better economics—by unifying secure device access, user authentication, …

Read this white paper to know how you can unleash the full potential of mobility—greater productivity, simplicity and better economics—by unifying secure device access, user authentication, provisioning, and management with BYOD.

Published in: Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Business white paper Deliver unparalleled value with BYOD A holistic approach to BYOD security and management
  • 2. Business white paper | A holistic approach to BYOD security and management Table of contents 3 Executive summary 3 Business drivers: Transform your workplace with BYOD mobility 4 BYOD challenges 5 Enhance productivity with predictable, high-quality user experiences 7 Conclusion
  • 3. Business white paper | A holistic approach to BYOD security and management Executive summary Mobile technology is transforming your business. Your workforce uses a variety of mobile devices such as smartphones and tablets to conduct business and engage customers anywhere, anytime. The Bring Your Own Device (BYOD) trend presents opportunities and challenges. On one hand, you can boost employee productivity, convenience and, in many cases, reduce capital expenses by allowing workers to use personal devices for business. On the other hand, you need to ensure that your IT infrastructure can accommodate the influx of mobile devices and continue to deliver predictable, high‑quality user experiences, as well as secure and reliable services. This white paper explains how you can unleash the full potential of mobility—greater productivity, simplicity and better economics—by unifying secure device access, user authentication, provisioning, and management with BYOD. By taking a holistic approach to BYOD, you realize all the benefits of mobility without compromising security, while minimizing the impact on your IT organization. Business drivers: Transform your workplace with BYOD mobility Rapid advances in mobile technology and the growing adoption of rich media communications are fundamentally changing the ways your employees perform business and interact with customers, partners, and colleagues. Armed with laptops, smartphones and tablets, today’s mobile information workers conduct business from any location, at any time, exploiting the latest interactive video, social media and unified communications tools to increase productivity and improve the customer experience. The BYOD onslaught Sales of smartphones and tablets are skyrocketing. In 2011, roughly twice as many smartphones and tablets were sold as laptops. By 2015, Smartphones and tablets represent more than 90 percent of the new net growth in device adoption for the coming four years.1 The lines between home and work are blurring. Your employees use smartphones and tablets at home and work. They don’t want to carry around two sets of devices for work and personal use. They prefer to use a single device, and many are perfectly happy to use their personal smartphones and tablets for business. According to a CIO survey conducted at Gartner Summits held in the United States and Europe indicated that, by 2014, 80 percent of the global workforce will be eligible to participate in a BYOD program.2 The question is no longer will you support user-owned devices, but how can you deliver the best user experience while securing and managing these devices? Do you have the necessary systems and practices in place to optimize employee productivity, while protecting your IT assets and ensuring business continuity? Can you adequately support guest users—customers, visitors, and contract workers—without compromising network security or network performance? Are you fully prepared for the BYOD onslaught? G artner Reveals Top Predictions for IT Organizations and Users for 2012 and Beyond, Gartner Newsroom, December 2011. 2 Creating a Bring Your Own Device Policy, Gartner, April 2011 1 3
  • 4. Business white paper | A holistic approach to BYOD security and management BYOD challenges BYOD initiatives fundamentally impact your operations. Until now, you had tight control over your IT environment and the endpoints attached to it. You thoroughly evaluate desktops, laptops, and notebooks before approving them. You provide a list of supported devices, and your IT organization is actively involved in procuring, deploying, managing, and retiring them. BYOD changes everything. It is impractical to evaluate all the mobile devices on the market. The market is highly diverse—with a wide range of devices, brands, and operating systems. And the market is evolving at a rapid pace. New devices and software releases are introduced on a regular basis. Placing tight restrictions on the list of approved devices only reduces the effectiveness of your BYOD initiative. To make the most of your BYOD program, you need to take a broad approach to device support, while ensuring you have adequate controls and policies in place to maintain your network’s security, reliability, and service quality. BYOD initiatives introduce a number of operational challenges: • Device Onboarding—bringing new devices onto the network for the first time. You need a flexible approach that supports an array of company-, employee-, and guest-owned devices—one that enables users to onboard quickly and easily, with minimal imposition to your help desk. • Maintaining BYOD security and mitigating risk—protecting the integrity of your network, systems, and data. Unknown devices and guest users present a variety of BYOD security challenges. You need to put stringent access controls, usage policies, and security solutions in place to safeguard your assets. And you need systems for revoking access privileges when employees leave the company or when devices are lost or stolen. • Ensuring high service quality—optimizing end-user quality of experience. You need a network architecture that delivers predictable and reliable end-user experiences, and delivers consistent and seamless connectivity across your wired and wireless LAN (WLAN) infrastructure. • Managing growth—meeting ever-increasing performance and traffic requirements. You need a network that cost-effectively scales to accommodate growing numbers of devices and the ever-expanding traffic volumes that accompany video and rich media communications. • Supporting a diverse environment—administering a vast array of BYOD devices and technologies. You need a unified BYOD management system that provides visibility and control over a wide variety of devices (multivendor desktops, laptops, smartphones, tablets, e-readers), users (employees, contractors, visitors), and network segments (LAN, WLAN, WAN). Formulate a BYOD plan Every business, including yours, is unique. The first step in instituting a BYOD program is formulating an implementation strategy that addresses your specific business requirements. Gartner has developed a two-dimensional framework for analyzing the business risk of personal‑owed devices that calls out four distinct BYOD approaches.3 (See figure 1) Figure 1: BYOD implementation scenarios High Embrace Contain Disregard Block Value to business Low NAC Strategies for Supporting BYOD Environments, Gartner, December 2011 3 4 Low Security “pressure” High
  • 5. Business white paper | A holistic approach to BYOD security and management • Embrace—Allow everyone to use all devices to access all resources • Contain—Allow some people to use some devices to access some resources • Disregard—Ignoring the presence of personally owned devices in a corporate environment • Block—Ban the use of consumer-grade products or services by explicitly prohibiting their use in an appropriate policy The research firm recommends most organizations should start with a Contain strategy and use NAC policies to isolate personally owned mobile devices in a limited access zone, where they may access a subset of applications and data. By appropriately identifying user roles and responsibilities, and properly assessing their associated security risks and support challenges, you can implement the BYOD program that best meets your organization’s needs. Enhance productivity with predictable, high-quality user experiences Your ultimate BYOD goal is to deliver a superior end-user experience and to enhance productivity without compromising the security or integrity of your IT environment. You need a BYOD solution that is easy to deploy and integrate with your existing infrastructure, and easy to maintain and manage. Unified security and management systems are critical for executing a successful BYOD plan, and for ensuring consistently high-quality user experiences. By taking a holistic approach to BYOD administration—employing a unified wired and wireless management system with centralized security, visibility, and control across all users and devices (company or personally owned)—you can simplify your operations. Deliver easy access from any device One of the top BYOD initiative requirements is to deliver a high-quality user experience, and ensure users have convenient and consistent access to enterprise applications and services from any device, at any time. At the same time, you need to protect your intellectual property, safeguard your IT infrastructure against attacks and viruses, and prevent data loss. Simple network access Comprehensive network access controls based on user and device identity are the first line of defense in any security strategy. By implementing granular identity-based access control policies, you can tightly govern how specific users or devices access your network. For ultimate ease of use and deployment, it is important that you select a solution that integrates with enterprise directory services. Unified wired and wireless access To ensure predictable and reliable end-user experiences, you must deliver consistent and seamless connectivity across your wired and wireless infrastructure. By employing unified access control solutions and implementing common authentication credentials across your entire enterprise network, you can be certain users have uniform access to network services whether wired or wirelessly connected. High-performance wireless networks You may need to retool your BYOD WLAN environment to support expanding performance and capacity requirements. The latest wireless access points you can provide greater WLAN performance, better coverage, improved reliability, and greater capacity for better end-user experiences. You should also reconsider your wireless network design as smartphones and tablets have limited transmit power and require a higher density WLAN to achieve optimal performance. Enforce security policies Security breaches can tarnish your company’s reputation and result in loss of business, stolen intellectual property, lawsuits or regulatory fines. By taking a cohesive, multi-layer approach to security, you can allow your workforce to enjoy all the benefits of a BYOD program while protecting your company’s valuable business assets and mitigating risks. 5
  • 6. Business white paper | A holistic approach to BYOD security and management Intrusion detection and prevention Your IT infrastructure is susceptible to a vast array of denial of service attacks, viruses and other increasingly-sophisticated threats from inside and outside your company, and from user- or company-owned devices. Intrusion detection and prevention solutions continuously monitor, block, and log malicious activities, helping you thwart attacks, guarantee system availability, and maintain business continuity. Device profiling and posturing You may want to establish distinct security policies for different types of devices. Device profiling or device fingerprinting is essential for determining a device’s type (by operating system or device category) so you can treat it accordingly. Device posturing allows you to restrict certain categories of devices to specific applications or particular network segments or services to contain threats and mitigate risks. Unified policy administration An enterprise-wide policy management system allows you to provide consistent access to applications and services across different devices and network segments. By implementing a unified authentication and authorization solution with a single administrative interface, you can simplify operations and management, and ensure users have uniform access to business applications and services. Manage and monitor the BYOD users BYOD initiatives will impact your network operations, planning, and engineering functions. You need to make sure your network administrators have tools to efficiently observe and control user behavior, and to ensure a superior experience with BYOD management. Single pane-of-glass management Historically, you may have built up management tools, implementing discrete management systems for distinct network elements. By moving to a unified management system, you can gain significant operational efficiencies by streamlining administration, centralizing policy administration, and monitoring all from a single platform. The integrated management solution provides centralized visibility and control over your entire network, and supports a wide range of devices (multivendor PCs, Smartphones, tablets, company owned or user owned), users (employees, contractors or guests), and infrastructure (LAN, WLAN, WAN). By implementing a unified management system, you will resolve problems more quickly and optimize resource allocation by correlating holistic network information. Bandwidth control for efficient application access Application performance is critical for fostering positive user experiences and maximizing the productivity of your workforce. By deploying granular bandwidth controls, you will be able to enforce quality of service levels and set different rate limits for different applications/users/devices to ensure your network resources are aligned with your business needs, and users are satisfied and productive. Monitoring user behavior It is important to understand exactly how your users and guests are consuming IT resources. Your network administrators will need rich monitoring and reporting tools so they can see which applications and websites users access, ensure your IT assets support the needs of the business, and assure your BYOD initiative leads to greater productivity and efficiency. 6
  • 7. Business white paper | A holistic approach to BYOD security and management Conclusion To succeed in today’s global economy, your workers need to conduct business from any location, using any device. By allowing workers to use personal smartphones and tablets for business, you can enhance productivity and improve your company’s competitive position. To be fully productive, your mobile workers must have convenient and reliable access to all their enterprise applications and services, at all times. BYOD initiatives do not need a separate monolithic infrastructure. By treating BYOD as an integral component of your overall network architecture, you can provide a consistent, high-quality user experience across your entire enterprise without compromising security. With a holistic approach to BYOD—implementing single pane-of-glass management with centralized security, visibility, and control—you can unleash the full potential of mobility and deliver the ultimate BYOD user experience, while simplifying IT operations and management. Learn more at 7
  • 8. Business white paper | A holistic approach to BYOD security and management Sign up for updates Share with colleagues Rate this document © Copyright 2012–2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 4AA4-3738ENW, March 2013, Rev. 1