But to meet the needs of Enterprise, Wireless LAN networks must provide the following 4 key elements All-wireless : Has become the preferred access because the right wireless network can now support the content size & latency requirements that BYOD / Mobile demand. According to Gartner By 2015, 20% of the enterprise mobile PC population will rely on WLAN as the only type of office connection. Scalability - BYOD & IoT – In 2015 it is expected that over 50B smart devices will be connected to the Internet through mostly a wireless network – people to people, people to apps, & apps to apps or devices to devices Network Convergence Big data & Video – the type of data going through the network is BIG – both in terms of the bandwidth requirement & also in terms of metadata Finally ‘Intelligent Industries’ – this means industries now have the capability to enable visibility into all sorts of network data that includes people’s likes/dislikes & behaviors, events, machine status, & environmental data that they never had before. Organizations now have the ability to do predictive management of network, the systems & the Apps But in order to have that intelligence, they need intelligent IT. IT is now more important than ever, because they are not just concerned about the backend offices, they now have to worry about the user experience (with all these BYOD) & at the same time provide the tools for the organization to get the intelligence they can now get This means the role of the network has significantly changed- the types of devices, the volume of devices, the rate of change, the bandwidth required & the types of applications needed, IT can no longer rely on traditional network connectivity. Today networks need to have some characteristics that are more critical than before: Intelligence – detect type of traffic & enforce policies based on traffic type & pattern, device, use, location, access type, etc Identity-based traffic forwarding Predictive management These devices and their applications are causing users (IT, end-user, the business) demand for: Increased wireless availability A wireless network that delivers the same quality of user experience as wired Availability Reliability Transparent to user (it just works) Security Ease-of-use ---------------------------------------------------------- end of script --------------------------------------- Quality of Experience To Web applications To SaaS applications To social media To traditional enterprise applications To datacenter resources To bandwidth Using any approved device - Anytime / anywhere connectivity It is not just about the user - Machine to machine applications require a mission critical wireless network – in many cases these machines are critical to patient care, infrastructure, and equipment Medical devices reporting on patients Utility monitoring sensors - reporting and making decisions on petroleum flows/delivery, water, electricity, gas Agricultural monitoring sensors – soil variables, weather, temperature Building management The wireless car Analyst notes: Empower Users At The Edge By Moving To The Third Generation Of WLANs. – Forrester In the workplace, we have seen the average number of mobile devices per user (the mobile stack) explode from 2.7 in 2011, to 3.5 in 2012. – iPass The network must now support a mix of applications & services, including voice & video, enhancing security, deploying WLANs & supporting wireless applications. – IDC A network architecture that focuses on monitoring, controlling, & optimizing the quality of user experience. - Forrester The all-wireless office is becoming a reality — Wireless bandwidth is now sufficient to handle all foreseen loads, including video, for most users. - Gartner Multimedia capabilities — voice/UC & video: Another increasing trend in enterprise use of mobile devices is the increasing presence of voice & video applications. - IDC Through 2015, 80% of customers will have to upgrade the WLANs they just put in place. – Gartner The Internet of things – Term may have come from some MIT professors - http://www.smashingapps.com/2011/09/11/the-internet-of-things-infographic.html
There is a general confusion in the market place that the management of Bring Your Own Devices (BYOD) is just about Mobile Device Management (MDM). If fact, a complete BYOD management must start with NAM solution and in some cases it also includes Mobile Device Management (MDM). These are two different and complementary solutions. NAM is a natural progression of traditional Network Access Control (NAC), as it extends its management to handle the explosive growth of mobile devices; and integrates with MDM and other complementary solutions like Virtual Desktop Infrastructure (VDI) and Firewalls. Mobile Device Management (MDM) is about managing the health of the devices, the applications and content – it’s about protecting data in user devices, controlling what applications can be downloaded, when to remotely wipe the content of the device, inventory of the number and types of mobile devices, etc. These features may become important for enterprises in specific vertical that required stricter management of their mobile devices, such as government and healthcare, but in general they are not mandatory for a BYOD deployment – like in other verticals such as higher education, K-12 and others. For example, a hospital may require email data residing on mobile devices to be encrypted and the data on a device be remotely wiped if lost, potentially saving the hospital from a breach of HIPAA regulations. However, even when a MDM solution is deployed there is a need for network level policy enforcement, onboarding of un-managed devices, guest access management, dynamic threat detection and mitigation and the protection against other un-managed devices that get connected to the infrastructure. NAM All devices that want to access the corporate network must have a way to easily onboard the network and must also be authenticated, authorized and controlled. Once they are connected to the network, their performance must be centrally visible and controlled based on pre-established security policies. Network resources such as bandwidth usage and other resources must be made available based on user name, user type, device type, location, time of day, etc. This process for onboarding, control and visibility must be applied for all devices: wired and wireless; corporate-owned, employee-owned or guest-owned; jail-broken devices or tightly secured; and these features and functionalities must be based upon device- and/or user-specific policies as defined by the organization. Also the devices that connect to the network are not just PCs, smartphones, iPads and other tablets, they also include the plethora of other mobile devices such as security cameras, e-books, medical equipment, cash registers and numerous other devices that are receiving and sending data over the network. All these devices must be managed and secured, too – and it is the job of the Mobile IAM, not MDM. This is why all organizations need Mobile Identity and Access Management (IAM) solutions for BYOD and corporate-owned devices using a solution like the Enterasys Mobile IAM. VDI Beyond network access management and management of devices with MDM, some organization may choose to restrict business data only on corporate-own devices or on devices with installed MDM software, or may be they want to restrict jail-broken iPads - in these cases the organization may decide that access to the business data can only be provided though a Virtual Desktop Infrastructure (VDI). VDI provide "virtualized" desktop and data on a remote central server, instead of on the local storage of a remote client; therefore, when users work from their local machine, all of the programs, applications,
Really the only thing to stress here is the fact that identiFi is the integrated WiFi solution for OneFabric. They are unified!!!
. Here is an example What others take two weeks to do – we do in realtime This is a critical element on why we are able to displace
iBoss SWG Web Filter & Enterasys Mobile IAM
Desenganche todo el valor asociado de su MDM, Administración deIdentidad & Accesso (IAM) y Herramientas de Filtrado de ContenidoMayo 1, 2013WebinarIndustria