Meru Byod 2012 Jul30

702 views

Published on

Simplify guest access and BYOD provisioning for any OS on any network!

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
702
On SlideShare
0
From Embeds
0
Number of Embeds
45
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Meru Byod 2012 Jul30

  1. 1. BYOD OVERVIEW Bob Brezany– Territory Sales Manager rbrezany@merunetworks.com 314.313.37841 PROPRIETARY AND CONFIDENTIAL Meru Confidential
  2. 2. What if, your captive portal actually “captured” user information?2 PROPRIETARY AND CONFIDENTIAL
  3. 3. LoginCredit Card Welcome to our guest hotspot! Fully customize this page and add the Guest Self Registration components you want! Password Change 3 PROPRIETARY AND CONFIDENTIAL
  4. 4. And then provided credentials automatically and securely?4 PROPRIETARY AND CONFIDENTIAL
  5. 5. Send account information viaprint-out, email, orSMS text message5 PROPRIETARY AND CONFIDENTIAL
  6. 6. And provided a complete audit of all activity?6 PROPRIETARY AND CONFIDENTIAL
  7. 7. > When they logged in > Where they logged in > The guests address> What they did> What was allowed> What was disallowed 7 PROPRIETARY AND CONFIDENTIAL
  8. 8. One policy for your entire network, wired and wireless8 PROPRIETARY AND CONFIDENTIAL
  9. 9. > Dynamically generate guest portal based upon your policy using: Location IP Address Cookies HTTP Header Language Time of Day Web Browser GET Parameter Device OS Mobile Device POST Parameter9 PROPRIETARY AND CONFIDENTIAL
  10. 10. With Identity Manager from Meru Networks, you can…10 PROPRIETARY AND CONFIDENTIAL
  11. 11. Take Control> Employees use both Corporate Business Diversity of Devices and Personally Critical Owned Devices> As do • Guests • Contractors WLAN for Casual Use • Consultants Diversity of Users11 PROPRIETARY AND CONFIDENTIAL
  12. 12. Control the device Automatically Provision Secure Network Access For Bring Your Own Device (BYOD)?12 PROPRIETARY AND CONFIDENTIAL
  13. 13. Control user access Automatically Provision the Right Policy for Each User13 PROPRIETARY AND CONFIDENTIAL
  14. 14. Simplify guest access and BYOD provisioning for any OS on any network14 PROPRIETARY AND CONFIDENTIAL
  15. 15. With Meru Identity Manager for BYOD> You can: > Easily create user accounts > Automatically provide access credentials to your guests > Give different levels of access based on policy > Audit and Record everything that happens > Meet your security requirements > Maintain control 15 PROPRIETARY AND CONFIDENTIAL
  16. 16. Thank you! Bob Brezany Territory Sales Manager, STL and Central Illinois Meru Networks ( Office: 314-313-3784 ( Mobile: 314-313-3784 * Email: rbrezany@merunetworks.com16 PROPRIETARY AND CONFIDENTIAL

×