SlideShare a Scribd company logo
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
Conquering Today’s 
Bring Your Own Device Challenges 
A framework for successful BYOD initiatives
Aruba Networks, Inc. 2 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
Table of Contents 
Introduction 3 
BYOD drivers 3 
Consumer choice 3 
IT considerations 3 
Device and information overlap 4 
Application accessibility and data protection 4 
Manual and automated policies 4 
IT and helpdesk overload 5 
Shortcomings of BYOD solutions 5 
Wireless, wired and multivendor considerations 5 
The point-product approach 5 
Siloed visibility 6 
Simplicity and automation 6 
When BYOD works 6 
Device onboarding, provisioning and profiling 7 
Policy management based on user roles and devices 7 
Identifying and remediating compromised devices 8 
Guest Wi-Fi access 8 
Visibility and reporting 9 
The Aruba ClearPass access management platform 10 
ClearPass Policy Manager 10 
ClearPass Onboard 11 
ClearPass Profile 11 
ClearPass Guest 12 
ClearPass OnGuard 12 
ClearPass QuickConnect 12 
Meeting the BYOD challenge with Aruba 13 
The ClearPass advantage 13 
About Aruba Networks, Inc. 14
Aruba Networks, Inc. 3 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
Introduction 
Today’s growing demand for anytime, anywhere network access has expanded to include the use of personal 
mobile devices such as laptops, tablets, smartphones, e-readers and more. This Bring Your Own Device 
phenomenon is changing the way IT organizations and users address network access security. 
For IT organizations, BYOD means supporting a variety of devices and their operating systems, and maintaining an 
expected level of service. To keep costs low, it must be easy to securely onboard new devices and quickly identify 
and resolve problems. 
For users BYOD means using the laptop or smartphone that works best for their needs. They must also understand 
support considerations and what happens when a device is replaced, lost or stolen. 
This paper discusses the benefits and considerations associated with BYOD, and how organizations can effectively 
deploy a unified access management solution for any wireless, wired or VPN network. 
BYOD drivers 
Consumer choice 
From the executive who purchased an iPhone to boost personal productivity to the college professor who 
redesigned the curriculum to take advantage of new tablet applications, users in all types of organizations are 
bringing consumer devices to work. And when they do, everyone expects access to business applications and 
content, not just the Internet. 
As a result, the number of devices per employee is growing from a one-to-one relationship to a one-to-many 
relationship. A single user today will interchangeably connect to the network with a Windows laptop, and possibly 
an iOS or Android smartphone or a tablet throughout the day. 
In fact, the adoption of smartphones, tablets and notebooks is expected to grow at a compounded annual growth 
rate of 25.7% through 2015. 
IT considerations 
In response to this consumerization of IT, 
organizations are not only expanding their 
support of Windows devices, but also 
embracing the demand for Mac OS X, iOS 
and Android devices. This often requires 
introducing new network components that 
assist in identifying these devices and 
enforcing network access privileges. 
IT organizations will also need to 
consider the following when first 
exploring a BYOD initiative: 
• Device and information overlap and 
security implications. 
• Application accessibility per user and 
per device. 
• Enforcement of policies. 
• Automated policy enforcement. 
• IT and helpdesk overload and levels 
of visibility. 
Any Device 
Galaxy Tab MacBook iPhone iPad Droid 
Any Network 
VPN 
The Aruba BYOD Solution
Aruba Networks, Inc. 4 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
Device and information overlap 
Lengthy evaluations that lag the introduction of new devices are a key driver for organizations to allow users to 
purchase their own devices. For these reasons, some organizations are scaling back on the provisioning of 
corporate-owned devices and are exploring subsidized programs where the user is reimbursed for the initial 
purchase of a laptop as well as contributing to monthly service charges for smartphones. 
The effect of granting enterprise access to personal devices does have direct implications on security, information 
ownership, device/network control and even helpdesk resources. These security challenges include: 
• Understanding who and what is on the network. 
• Keeping the network malware-free. 
• Determining the level of information that can be stored on a BYOD endpoint. 
• Providing proper enforcement of access policies to maintain compliance and audit requirements. 
Application accessibility and data protection 
As mobile devices become more mainstream, it will be difficult to differentiate access to consumer and corporate 
applications. FaceTime, Skype, Facebook, and others are blurring the definition of consumer applications. 
Collaboration applications like Dropbox and Citrix on mobile devices are driving the need to ensure that security 
and Wi-Fi services meet demands. 
Addressing which applications can be used for personal and business applications, what can be stored on cloud 
services, and if virtual desktop infrastructure (VDI) applications are a requirement that must also be explored. 
Most organization do not want to control what applications someone puts on their personal device, but they do 
want to control which applications can be used over the corporate network. In some instances, authentication of 
the device is a precursor to the user then initiating a Citrix session to ensure access to confidential data. 
As this use your own application on BYOD devices proliferates, organizations must consider a network policy 
management system that addresses the concerns below and interoperates with external mobile device 
management applications that monitor device usage: 
• Instant messaging 
• Video and photography storage 
• E-mail and texting 
• Internet browsing on and off campus 
• Device tracking 
• Wiping of devices or containers 
Manual and automated policies 
The adoption of BYOD requires each user to understand the implications of personal devices, the type of 
information that can be stored on these devices, and what is expected of them to meet pre- and post-authentication 
requirements. 
While manually distributed policies are a start, automated policy enforcement lets organizations leverage 
information from the devices themselves. This promotes a policy enforcement approach that’s based on real-time 
changes in device risk, physical security and time of day. 
For example, depending on the device, ensuring that access to corporate information and the use of anti-virus and 
peer-to-peer applications are met before and during a network access session becomes a process that can 
actually be maintained without much interaction by the user or IT.
Aruba Networks, Inc. 5 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
IT and helpdesk overload 
Similarly, IT and helpdesk resources can be quickly overwhelmed as the organization struggles to configure and 
support these new BYOD endpoints for secure network authentication and corporate use. Automated tools that 
allow end-users to securely self-onboard their devices are critical to offload the helpdesk organization. 
The visibility needed to support successful and unsuccessful authentications will also increase as new devices are 
introduced and users adopt new applications that meet or might not meet corporate guidelines. The ability to 
quickly find entries corresponding to individual users and information on specific devices is essential – regardless 
of how or where users connect. 
Shortcomings of BYOD solutions 
Wireless, wired and multivendor considerations 
Numerous network access products are available today, many of which are being positioned as BYOD solutions. 
However, most fall short of providing the necessary scope required to span wired, wireless, and VPN infrastructures 
and to support employees, contractors and guests and the myriad devices they own. 
Solutions from infrastructure vendors, for example, ignore the multivendor nature of most enterprise networks, 
leaving gaps in coverage that may require additional point solutions. Some solutions only focus on Wi-Fi while 
others require a client on the end-device that only works with mobile operating systems like iOS and Android. 
The point-product approach 
A number of BYOD security solutions are merely point products that offer one solution for laptops, one for mobile 
devices, and so on. This approach to network access policy management and BYOD is complex and costly to 
implement, requiring IT to purchase and support multiple components that do not interoperate well with the existing 
network infrastructure. 
Such complexity can also be an impediment to users by requiring manual device provisioning, which results in a 
flurry of helpdesk calls. Device provisioning must be simple for users in order to discourage them from attempting 
to circumvent it. 
Users need the flexibility to securely self-provision a device or utilize a sponsor role within the guest access 
process, regardless of access method. This makes it easy for any user to onboard with little or no IT intervention. 
Aruba ClearPass: Any Network, Any User, Any Endpoint 
Wired Switches Wireless APs VPN Managed 
Endpoints 
UnManaged 
Endpoints 
Endpoint 
Assessment 
• Aruba 
• Cisco 
• HP 
• Enterasys 
• Extreme 
• Juniper 
• Foundry 
(Brocade) 
• and More 
• Aruba 
• Meru 
• Meraki 
• Cisco 
• Enterasys 
• Motorola 
• Xirrus 
• and More 
• Aruba 
• Cisco 
• Juniper 
• SonicWall 
• F5 
• Check Point 
• and More 
• Windows 
• Mac 
• Linux 
• iPhone/iPad 
• Android 
• Printers 
• VoIP Phones 
• Medical Devices 
• MFG. Devices 
• Security 
Equipment 
(cameras, etc.) 
• NAP, NAC 
• A/V, A/S 
• Firewall 
• Discovery 
• Patch 
Management 
• Vulnerability & 
Port Scans 
Adaptable to any customer infrastructure
Aruba Networks, Inc. 6 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
IT organizations need the flexibility to define policies based on multiple variables, including: 
• When and where a given type of device, such as a smartphone, can be used. 
• What resources that specific user is allowed to access via that device. 
• What services and applications the user can run from that device. 
• How much bandwidth a given device or application is allowed to consume. 
Siloed visibility 
IT needs a solution that provides complete visibility into what IT-managed and BYOD devices are admitted onto the 
network. Real-time visibility, including device profiling, is a prerequisite for granular access control as well as for 
reporting, planning, auditing and compliance. 
For example, only with these tools in place can IT verify that the chief financial officer’s lost smartphone hasn’t 
been used to gain access to sensitive data. A siloed model often requires the IT to monitor multiple tools, which is 
counterproductive. 
Simplicity and automation 
Solutions that lack basic onboarding and per-session data force organizations to spend less time on business-critical 
projects and more time performing manual troubleshooting and diagnostics. 
While it may seem daunting to support BYOD, organizations can embrace this trend by taking a holistic approach 
that automates processes and takes into consideration IT and user requirements as well as work habits. 
When BYOD works 
Organizations can reap a wide range of benefits by embracing BYOD initiatives, including the ability to quickly 
support user needs and devices, boost productivity, and in many cases, reduce expenses. 
One of the first things to consider when deploying secure BYOD is a simplified workflow that can accommodate all 
device types, work with the existing infrastructure, and allows organizations to start small, measure progress and 
then easily support additional requirements on the base platform as needed. 
BYOD access deployment strategy 
Implement and Adjust 
Prohibit 
Only allow corporate 
specic devices 
IT designated devices 
IT managed devices 
Limit 
Internet and select 
resources 
Select BYOD devices 
User managed devices 
Trust 
Full access 
Differentiated BYOD 
devices 
IT provisioned, user 
managed devices 
Embrace 
Any device, 
any location access 
Multiple differentiated 
BYOD devices per user 
IT and user provisioned
Aruba Networks, Inc. 7 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
To address these challenges, Aruba Networks® developed the ClearPass Access Management System™. A key 
part of the Aruba Mobile Virtual Enterprise (MOVE) architecture, ClearPass provides a user- and device-independent 
framework that tackles any BYOD initiative, large or small, by providing: 
• Self-service onboarding, provisioning and revocation of access for all major mobile devices. 
• Device identification as a basis for grooming traffic and improving network security. 
• Consistent policy enforcement across multivendor wireless, wired and VPNs. 
• Controlled access and remediation for compromised devices. 
• Secure guest network access with simplified workflows. 
• Enhanced security, reporting and regulatory compliance. 
Device onboarding, provisioning and profiling 
A BYOD solution must automate the authentication and device onboarding process so that employees, contractors, 
students and guests can self-register devices for secure access to secure wireless and wired networks, as well 
as VPNs. 
Supported device types: 
Operating Systems Wi-Fi Access Wired Access Versions 
Windows Yes Yes Windows 7, Vista, XP 
iOS Yes N/A 4.x and up 
Mac OS X Yes Yes 10.5 and up 
Android Yes N/A 2.1 and up 
Underlying complexity must also be removed to easily configure network and posture assessment settings, and 
provision and revoke certificates or unique device credentials to ensure that only approved devices are used. 
User and device information captured during self-registration and device profiling will allow organizations to create 
and manage policies that are far more granular than those where only baseline fingerprinting or using MAC address 
authentication is performed. 
Profiling should include baseline dynamic host-configuration protocol (DHCP) fingerprinting and browser detection, 
as well as collecting detailed information from sources such as agents, RADIUS authentication servers, and Active 
Directory data. 
Policy management based on user roles and devices 
The administration and enforcement of policies based on user role and device type lets organizations create and 
enforce policies that apply to a group of users or devices. It also leverages other contextual information that 
pertains to either the user or device within policy enforcement. 
For example, organizations can ensure that access to appropriate data is different for the engineering staff versus the 
finance staff to satisfy internal and external compliance mandates. Additional contextual data on device roles ensure 
that access for known laptops is different from iPads that have Internet-only access through a BYOD program. 
No two organizations are exactly alike, so BYOD has different connotations depending on who you talk to. To some 
users, like a doctor, it means bringing a laptop or tablet to work and accessing electronic medical records (EMR). 
To a college professor, it may mean hosting a conference, easily acquiring guest access for each user and ensuring 
secure access regardless of the type of device.
Aruba Networks, Inc. 8 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
An effective BYOD access management solution must be vendor neutral, based on open standards, and leverage 
an enterprise’s existing security, identity and network infrastructure. Policy enforcement methods must have the 
flexibility to satisfy the majority of use cases that organizations want to support, such as role-based policy 
management, VLAN steering and SNMP enforcement for captive portals. 
In the aforementioned examples, policies can be enforced across any network – wireless, wired and VPN. Identity 
stores, user-roles, and authentication methods are updated as the policy system receives real-time profiling and 
visibility information. 
Identifying and remediating compromised devices 
A BYOD access solution should provide enterprise-class posture assessment and remediation that’s a cut above 
ordinary network access control (NAC) offerings. It must go well beyond traditional health checks to also examine a 
device’s runtime configuration and applications, and whether USB storage devices are allowed. 
The ability to use permanent and dissolvable agents is important as many of these devices will be administratively 
managed by the user. Dissolvable agents for BYOD reduce administrative overhead as they are downloaded during 
a captive portal login and removed once the web page is closed. 
In addition, enterprise-class posture assessment solutions typically compare the posture/health information against 
policies defined in a centralized policy decision point (PDP). For a BYOD access management solution to be 
effective, the PDP must have the ability to automatically quarantine non-compliant BYOD and IT-issued devices 
using role-based mechanisms or VLAN steering methods. 
As part of a comprehensive posture assessment approach, a BYOD access solution should: 
• Perform automated checks via persistent and dissolvable agents. 
• Check for up-to-date antivirus, antispyware and firewall software. 
• Check for USB storage and peer-to-peer applications and services, such as Skype and BitTorrent. 
• Provide control options, including protected network access, manual and auto-remediation via directed URLs, and 
denial of service. 
Finally, tying posture information with identity-related and other contextual data allows organizations to enforce 
differentiated policies as business needs dictate. 
Guest Wi-Fi access 
The definition of a guest user is much more complex now and could mean anything from a temporary contract 
employee to a shopper in a retail environment. As a result, a BYOD access management solution must provide 
similar capabilities for guests as well as for employees – including dynamic provisioning, profiling and role 
differentiation – which are needed to ensure that compliance requirements are met. 
Many organizations restrict guests to an isolated network segment, such as using a separate SSID from the 
corporate SSID, and provide Internet access only. However, the BYOD access solution should give IT the flexibility 
to create different access rules for different types of visitors. 
In addition, a guest solution must be easy to use, support multi-tiered administration and sponsor capabilities, 
and automate the ability to include contextual elements within policies that take into account time-of-day and 
day-of-week privileges. 
For example, when a guest enters information requesting access, the BYOD access solution must have the ability 
to create an account that sits in a disabled state until an approved sponsor has verified and approved the request. 
Automated methods must exist that deliver access credentials over SMS or email once approval has been received 
by the system.
Aruba Networks, Inc. 9 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
Visibility and reporting 
To address compliance and regulatory requirements, collection of transactional data for each user session offers IT 
and business managers a variety of deployment, troubleshooting, and reporting options. 
Web-based management. Providing IT staff with web-based access to the entire policy management system 
without requiring dedicated appliances or licenses ensures ease of use and a lower total cost of ownership. 
ClearPass Policy Manager dashboard 
Centralized policy management. In large deployments, IT needs management capabilities from a central location 
to ensure that policies are effectively deployed and managed to adhere to organization and user needs. For 
example, IT staff in Los Angeles should be able to define policies for remote workers in India or China. The time and 
cost savings are easily recognized – resources and travel budgets are not required to support new users and use 
cases or to perform troubleshooting. 
Multiple administration levels and role-based access. While policy management must be centralized to ensure 
consistency, organizations need the flexibility to administer policy management in a distributed fashion. A BYOD 
access solution must support a range of administration levels and role-based administration across the security, IT 
and helpdesk organizations. 
Access analytics and reporting. Visibility into access activity is crucial to meet compliance requirements and 
enhance the effectiveness of network access policies. A BYOD access solution must provide IT with advanced 
reporting capabilities that monitor current and archived access activity, generate a variety of reports, and analyze 
data based on access parameters by role, class of device and access location. 
IT also needs the ability to aggregate data, as well as apply filters and drill down for in-depth views.
Aruba Networks, Inc. 10 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
The Aruba ClearPass access management platform 
Aruba understands the challenges that organizations face when implementing an access solution that is robust yet 
flexible enough to handle the burgeoning BYOD trend. Aruba ClearPass is the only standards-based BYOD solution 
that provides access control as a non-disruptive overlay to an organization’s existing network. 
Open framework BYOD architecture 
ClearPass Policy Manager 
Remote Access Point 
VIA Client 
• Core AA 
• Certificate Authority 
• Device Profiler 
• Guest Access 
• Device Onboarding 
• Posture Assessment 
Active Directory Server 
LDAP Store 
Public Access Network Core Security Services 
OnGuard Agent 
Enterprise Access Network 
xxxx 
xxxx 
xxxx 
xxxx 
xxxx 
ClearPass Policy Manager 
As a result, an organization can leverage its existing network, identity and security infrastructure and simply turn on 
ClearPass functionality as needed. It’s a very cost-effective and adaptable approach that enables organizations to 
implement a BYOD solution that’s tailored to their particular needs. 
The ClearPass Access Management System includes the ClearPass Policy Manager appliance and the following 
feature-rich software modules: 
• ClearPass Onboard 
• ClearPass Profile 
• ClearPass Guest 
• ClearPass OnGuard 
A separate cloud-based application, ClearPass QuickConnect, makes it easy for users to self-configure 802.1X 
settings on their Windows, Mac OS X, iOS, Android and Linux devices for network authentication and connectivity. 
ClearPass Policy Manager 
The ClearPass Policy Manager combines all the capabilities of a robust BYOD solution on one platform. This central 
policy server provides differentiated, context-based access control, along with operational utilities designed to 
reduce IT overhead.
Aruba Networks, Inc. 11 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
With ClearPass Policy Manager, IT can easily automate and extend authentication and authorization policies across 
the entire organization for wireless, wired, VPN and guest access applications. Differentiated access capabilities 
based on a variety of attributes, including user role, device, time, and location are also available. 
In addition to its integrated policy management engine, RADIUS and TACACS+ servers for AAA support, the 
ClearPass Policy Manager can read from multiple identity stores and databases, including those based on 
Microsoft Active Directory, LDAP, SQL and Kerberos. This provides a unified policy model that ensures access 
controls are applied consistently across the organization. 
Hardware and virtual machine (VM) options provide organizations flexibility in the form factor they choose and the 
ability to mix and match hardware-based appliances and VM implementations with no discrepancy in features 
or functionality. 
Using VMs, for example, can reduce cost and complexity by lowering power and cooling requirements and 
simplifying cabling. Similarly, hardware appliances may be the best choice in larger data centers, while the VM 
option can be added to a server in remote offices when cost is a concern. 
Redundancy and failover is mandatory for an enterprise-wide policy server. Rather than dedicating a fully 
redundant appliance to passive/standby in an active/passive model, the ideal access management solution should 
support fault tolerance using a publisher-subscriber model. In this model, a primary server replicates or publishes 
all changes to one or more secondary servers. This approach is more flexible than other clustering models. 
ClearPass Onboard 
ClearPass Onboard, the enterprise provisioning 
software module for ClearPass Policy Manager, fully 
automates device onboarding for IT via a built-in 
administration interface. It offers full self-service 
provisioning for Windows, Mac OS X, iOS, and Android 
devices, and includes the configuration of 802.1X 
settings as well as the distribution and revocation of 
unique device credentials. 
Additional features include the ability to push 
configuration settings for mobile email with Exchange 
ActiveSync and VPN clients for some device types. 
ClearPass Profile 
ClearPass Profile, the device profiling software module for 
ClearPass Policy Manager, uses a five-tier system that 
includes DHCP and other advanced methods as well as 
end-user and device fingerprinting and profile information. 
Device-level information includes details such as operating 
system version, manufacturer and device category. 
This contextual information is stored and used to 
enhance policy decisions and to identify changes in a 
device’s profile, which in turn dynamically changes 
authorization privileges. For example, policies can be 
used to differentiate access for an employee’s 
company-issued device versus the same employee’s 
personally-owned device. 
ClearPass Onboard
Aruba Networks, Inc. 12 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
ClearPass Guest 
The ClearPass Guest software module for ClearPass Policy Manager enables IT as well as non-technical personnel 
to manage guest Wi-Fi accounts and onboarding tasks when providing network access for visitors in large and 
small environments. 
In addition to allowing employees and guests to self-register their own devices, ClearPass Guest supports role-based 
access controls, activity tracking for compliance and auditing, and unique features such as advertising and 
commercial-grade hotspot services. 
ClearPass OnGuard 
The ClearPass OnGuard software module for ClearPass Policy Manager enables comprehensive posture 
assessments that minimize the risk of viruses and the misuse of applications and services before devices connect 
to the network. 
Supporting persistent and dissolvable agents, including vendor-specific agents such as Microsoft Windows native 
supplicants, ClearPass OnGuard performs posture assessments on devices running Windows, Mac OS X and 
Linux operating systems, checking for the presence of anti-virus, anti-spyware, and firewall software from more 
than 80 vendors. 
In addition, ClearPass OnGuard checks for allowable services, processes, peer-to-peer applications like Skype, 
USB storage devices, VM clients, and hot spots, and provides auto-remediation or quarantine as organization 
policies require. 
ClearPass QuickConnect 
ClearPass QuickConnect is a cloud-based service that provides simple self-service 802.1X configuration for 
Windows, Mac OS X, iOS and Android devices, reducing the overhead burden on IT. 
IT configures endpoint variables to create network authentication packages, while users are presented with a 
configuration wizard via a captive web portal, Active Directory group policy object (GPO), USB device or CD. Users 
simply start the wizard, enter their credentials and connect to the network in minutes. 
Automated posture and health remediation 
Successful Authentication Failed Policy
Aruba Networks, Inc. 13 
Conquering Today’s Bring Your Own Device Challenges Aruba White Paper 
Meeting the BYOD challenge with Aruba 
As BYOD initiatives proliferate, organizations are under pressure to simplify the process of connecting new users 
and devices while maintaining strong security and keeping costs down. 
The Aruba ClearPass Access Management System is the industry’s first BYOD platform that takes a holistic 
approach to securing the mobile user, devices and network infrastructure. ClearPass provides a comprehensive 
standards-based, vendor-neutral solution that enforces access policies across any network, any device and 
any user. 
The ClearPass advantage 
Aruba ClearPass provides a simple, cost-effective and multivendor approach to connecting and securing BYOD 
and IT-managed users and devices. 
ClearPass delivers the following advantages for successful BYOD today: 
• User and device self-registration and onboarding to reduce the burden on IT. 
• Ability to deploy with Aruba access networks or existing infrastructure. 
• Unified visibility and control from a single platform. 
• The industry’s most intuitive administrative interface. 
• Centralized policy management and enforcement. 
• A consistent user experience regardless of device or location. 
For further information and assistance regarding BYOD best practices, contact Aruba Networks to discuss your 
BYOD lifecycle plan. 
Comprehensive IT and user initiated BYOD workflow 
Onboard Device 
1 
Join Domain 
2 
Control Device Access 
3 
Visibility  Reporting 
4
Conquering Today’s Bring Your Own Device Challenges 
Aruba White Paper 
© 2012 Aruba Networks, Inc. Aruba Networks’ trademarks include AirWave®, Aruba Networks®, Aruba Wireless Networks®, the registered Aruba the Mobile Edge Company logo, Aruba Mobility 
Management System®, Mobile Edge Architecture®, People Move. Networks Must Follow®, RFProtect®, and Green Island®. All rights reserved. All other trademarks are the property of their respective owners. WP_BYOD_071212 
1344 Crossman Avenue. Sunnyvale, CA 94089 
1-866-55-ARUBA | Tel. +1 408.227.4500 | Fax. +1 408.227.4550 | info@arubanetworks.com 
www.arubanetworks.com 
About Aruba Networks, Inc. 
Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company’s Mobile Virtual Enterprise (MOVE) architecture unifies wired and wireless network infrastructures into one seamless access solution for corporate headquarters, mobile business professionals, remote workers and guests. This unified approach to access networks dramatically improves productivity and lowers capital and operational costs. 
Listed on the NASDAQ and Russell 2000® Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, and Asia Pacific regions. To learn more, visit Aruba at 
www.arubanetworks.com. For real-time news updates follow Aruba on Twitter and Facebook.

More Related Content

What's hot

CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
Motorola Solutions
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
Md Yousup Faruqu
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
Caston Thomas
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
Intellicomp GmbH
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
Waterstons Ltd
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
Michael W. Chitwa
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
InnoTech
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
Kaseya
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
Hexnode
 

What's hot (20)

CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 

Viewers also liked

Wp wifi-essentials
Wp wifi-essentialsWp wifi-essentials
Wp wifi-essentials
J
 
Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003
J
 
802.11ac su
802.11ac su802.11ac su
802.11ac su
J
 
Wp 80211ac indepth (1)
Wp 80211ac indepth (1)Wp 80211ac indepth (1)
Wp 80211ac indepth (1)
J
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
J
 
Bp wireless-network-perf
Bp wireless-network-perfBp wireless-network-perf
Bp wireless-network-perf
J
 
October Market Watch is Here !
October Market Watch is Here !October Market Watch is Here !
October Market Watch is Here !
Michelle Makos
 
Manualul antrenorului
Manualul antrenoruluiManualul antrenorului
Manualul antrenoruluiIrinuca Iri
 
Tali ikatan dan simpulan
Tali ikatan dan simpulanTali ikatan dan simpulan
Tali ikatan dan simpulanSeyla Ilysm
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 

Viewers also liked (16)

Wp wifi-essentials
Wp wifi-essentialsWp wifi-essentials
Wp wifi-essentials
 
Waqar
WaqarWaqar
Waqar
 
Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003Cwna 106 exam_objectives_v6-01_2014_003
Cwna 106 exam_objectives_v6-01_2014_003
 
802.11ac su
802.11ac su802.11ac su
802.11ac su
 
Wp 80211ac indepth (1)
Wp 80211ac indepth (1)Wp 80211ac indepth (1)
Wp 80211ac indepth (1)
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Bp wireless-network-perf
Bp wireless-network-perfBp wireless-network-perf
Bp wireless-network-perf
 
October Market Watch is Here !
October Market Watch is Here !October Market Watch is Here !
October Market Watch is Here !
 
METHODS OF AUDITING
METHODS OF AUDITINGMETHODS OF AUDITING
METHODS OF AUDITING
 
Manualul antrenorului
Manualul antrenoruluiManualul antrenorului
Manualul antrenorului
 
Tali ikatan dan simpulan
Tali ikatan dan simpulanTali ikatan dan simpulan
Tali ikatan dan simpulan
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
SERVICE TAX
SERVICE TAXSERVICE TAX
SERVICE TAX
 
Trade union act, 1926
Trade union act, 1926Trade union act, 1926
Trade union act, 1926
 

Similar to Wp byod

IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
Citrix
 
Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop Architecture
ITOutcomes
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
Info-Tech Research Group
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Nuno Alves
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
Courtland Smith
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
Tariq Mustafa
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Byod security
Byod security Byod security
Byod security
Denise Bailey
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
PacketTrap Msp
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 

Similar to Wp byod (20)

IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop Architecture
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Headquartered at home community publication nx n pakistan
Headquartered at home   community publication nx n pakistanHeadquartered at home   community publication nx n pakistan
Headquartered at home community publication nx n pakistan
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Byod security
Byod security Byod security
Byod security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 

Recently uploaded

Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
boryssutkowski
 
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
smpc3nvg
 
National-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxNational-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptx
AlecAnidul
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
n0tivyq
 
Top 5 Indian Style Modular Kitchen Designs
Top 5 Indian Style Modular Kitchen DesignsTop 5 Indian Style Modular Kitchen Designs
Top 5 Indian Style Modular Kitchen Designs
Finzo Kitchens
 
Common Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid themCommon Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid them
madhavlakhanpal29
 
一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理
一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理
一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理
h7j5io0
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
7sd8fier
 
Can AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI preludeCan AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI prelude
Alan Dix
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
7sd8fier
 
Exploring the Future of Smart Garages.pdf
Exploring the Future of Smart Garages.pdfExploring the Future of Smart Garages.pdf
Exploring the Future of Smart Garages.pdf
fastfixgaragedoor
 
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
jyz59f4j
 
RTUYUIJKLDSADAGHBDJNKSMAL,D
RTUYUIJKLDSADAGHBDJNKSMAL,DRTUYUIJKLDSADAGHBDJNKSMAL,D
RTUYUIJKLDSADAGHBDJNKSMAL,D
cy0krjxt
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
Confidence Ago
 
CA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdfCA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdf
SudhanshuMandlik
 
20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf
ameli25062005
 
White wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva TschoppWhite wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva Tschopp
Mansi Shah
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
ameli25062005
 

Recently uploaded (20)

Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
 
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
一比一原版(Brunel毕业证书)布鲁内尔大学毕业证成绩单如何办理
 
National-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxNational-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptx
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
 
Top 5 Indian Style Modular Kitchen Designs
Top 5 Indian Style Modular Kitchen DesignsTop 5 Indian Style Modular Kitchen Designs
Top 5 Indian Style Modular Kitchen Designs
 
Common Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid themCommon Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid them
 
一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理
一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理
一比一原版(UCB毕业证书)伯明翰大学学院毕业证成绩单如何办理
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
 
Can AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI preludeCan AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI prelude
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
 
Exploring the Future of Smart Garages.pdf
Exploring the Future of Smart Garages.pdfExploring the Future of Smart Garages.pdf
Exploring the Future of Smart Garages.pdf
 
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
 
RTUYUIJKLDSADAGHBDJNKSMAL,D
RTUYUIJKLDSADAGHBDJNKSMAL,DRTUYUIJKLDSADAGHBDJNKSMAL,D
RTUYUIJKLDSADAGHBDJNKSMAL,D
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
 
CA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdfCA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdf
 
20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf20 slides of research movie and artists .pdf
20 slides of research movie and artists .pdf
 
White wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva TschoppWhite wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva Tschopp
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
 

Wp byod

  • 1. Conquering Today’s Bring Your Own Device Challenges Aruba White Paper Conquering Today’s Bring Your Own Device Challenges A framework for successful BYOD initiatives
  • 2. Aruba Networks, Inc. 2 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper Table of Contents Introduction 3 BYOD drivers 3 Consumer choice 3 IT considerations 3 Device and information overlap 4 Application accessibility and data protection 4 Manual and automated policies 4 IT and helpdesk overload 5 Shortcomings of BYOD solutions 5 Wireless, wired and multivendor considerations 5 The point-product approach 5 Siloed visibility 6 Simplicity and automation 6 When BYOD works 6 Device onboarding, provisioning and profiling 7 Policy management based on user roles and devices 7 Identifying and remediating compromised devices 8 Guest Wi-Fi access 8 Visibility and reporting 9 The Aruba ClearPass access management platform 10 ClearPass Policy Manager 10 ClearPass Onboard 11 ClearPass Profile 11 ClearPass Guest 12 ClearPass OnGuard 12 ClearPass QuickConnect 12 Meeting the BYOD challenge with Aruba 13 The ClearPass advantage 13 About Aruba Networks, Inc. 14
  • 3. Aruba Networks, Inc. 3 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper Introduction Today’s growing demand for anytime, anywhere network access has expanded to include the use of personal mobile devices such as laptops, tablets, smartphones, e-readers and more. This Bring Your Own Device phenomenon is changing the way IT organizations and users address network access security. For IT organizations, BYOD means supporting a variety of devices and their operating systems, and maintaining an expected level of service. To keep costs low, it must be easy to securely onboard new devices and quickly identify and resolve problems. For users BYOD means using the laptop or smartphone that works best for their needs. They must also understand support considerations and what happens when a device is replaced, lost or stolen. This paper discusses the benefits and considerations associated with BYOD, and how organizations can effectively deploy a unified access management solution for any wireless, wired or VPN network. BYOD drivers Consumer choice From the executive who purchased an iPhone to boost personal productivity to the college professor who redesigned the curriculum to take advantage of new tablet applications, users in all types of organizations are bringing consumer devices to work. And when they do, everyone expects access to business applications and content, not just the Internet. As a result, the number of devices per employee is growing from a one-to-one relationship to a one-to-many relationship. A single user today will interchangeably connect to the network with a Windows laptop, and possibly an iOS or Android smartphone or a tablet throughout the day. In fact, the adoption of smartphones, tablets and notebooks is expected to grow at a compounded annual growth rate of 25.7% through 2015. IT considerations In response to this consumerization of IT, organizations are not only expanding their support of Windows devices, but also embracing the demand for Mac OS X, iOS and Android devices. This often requires introducing new network components that assist in identifying these devices and enforcing network access privileges. IT organizations will also need to consider the following when first exploring a BYOD initiative: • Device and information overlap and security implications. • Application accessibility per user and per device. • Enforcement of policies. • Automated policy enforcement. • IT and helpdesk overload and levels of visibility. Any Device Galaxy Tab MacBook iPhone iPad Droid Any Network VPN The Aruba BYOD Solution
  • 4. Aruba Networks, Inc. 4 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper Device and information overlap Lengthy evaluations that lag the introduction of new devices are a key driver for organizations to allow users to purchase their own devices. For these reasons, some organizations are scaling back on the provisioning of corporate-owned devices and are exploring subsidized programs where the user is reimbursed for the initial purchase of a laptop as well as contributing to monthly service charges for smartphones. The effect of granting enterprise access to personal devices does have direct implications on security, information ownership, device/network control and even helpdesk resources. These security challenges include: • Understanding who and what is on the network. • Keeping the network malware-free. • Determining the level of information that can be stored on a BYOD endpoint. • Providing proper enforcement of access policies to maintain compliance and audit requirements. Application accessibility and data protection As mobile devices become more mainstream, it will be difficult to differentiate access to consumer and corporate applications. FaceTime, Skype, Facebook, and others are blurring the definition of consumer applications. Collaboration applications like Dropbox and Citrix on mobile devices are driving the need to ensure that security and Wi-Fi services meet demands. Addressing which applications can be used for personal and business applications, what can be stored on cloud services, and if virtual desktop infrastructure (VDI) applications are a requirement that must also be explored. Most organization do not want to control what applications someone puts on their personal device, but they do want to control which applications can be used over the corporate network. In some instances, authentication of the device is a precursor to the user then initiating a Citrix session to ensure access to confidential data. As this use your own application on BYOD devices proliferates, organizations must consider a network policy management system that addresses the concerns below and interoperates with external mobile device management applications that monitor device usage: • Instant messaging • Video and photography storage • E-mail and texting • Internet browsing on and off campus • Device tracking • Wiping of devices or containers Manual and automated policies The adoption of BYOD requires each user to understand the implications of personal devices, the type of information that can be stored on these devices, and what is expected of them to meet pre- and post-authentication requirements. While manually distributed policies are a start, automated policy enforcement lets organizations leverage information from the devices themselves. This promotes a policy enforcement approach that’s based on real-time changes in device risk, physical security and time of day. For example, depending on the device, ensuring that access to corporate information and the use of anti-virus and peer-to-peer applications are met before and during a network access session becomes a process that can actually be maintained without much interaction by the user or IT.
  • 5. Aruba Networks, Inc. 5 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper IT and helpdesk overload Similarly, IT and helpdesk resources can be quickly overwhelmed as the organization struggles to configure and support these new BYOD endpoints for secure network authentication and corporate use. Automated tools that allow end-users to securely self-onboard their devices are critical to offload the helpdesk organization. The visibility needed to support successful and unsuccessful authentications will also increase as new devices are introduced and users adopt new applications that meet or might not meet corporate guidelines. The ability to quickly find entries corresponding to individual users and information on specific devices is essential – regardless of how or where users connect. Shortcomings of BYOD solutions Wireless, wired and multivendor considerations Numerous network access products are available today, many of which are being positioned as BYOD solutions. However, most fall short of providing the necessary scope required to span wired, wireless, and VPN infrastructures and to support employees, contractors and guests and the myriad devices they own. Solutions from infrastructure vendors, for example, ignore the multivendor nature of most enterprise networks, leaving gaps in coverage that may require additional point solutions. Some solutions only focus on Wi-Fi while others require a client on the end-device that only works with mobile operating systems like iOS and Android. The point-product approach A number of BYOD security solutions are merely point products that offer one solution for laptops, one for mobile devices, and so on. This approach to network access policy management and BYOD is complex and costly to implement, requiring IT to purchase and support multiple components that do not interoperate well with the existing network infrastructure. Such complexity can also be an impediment to users by requiring manual device provisioning, which results in a flurry of helpdesk calls. Device provisioning must be simple for users in order to discourage them from attempting to circumvent it. Users need the flexibility to securely self-provision a device or utilize a sponsor role within the guest access process, regardless of access method. This makes it easy for any user to onboard with little or no IT intervention. Aruba ClearPass: Any Network, Any User, Any Endpoint Wired Switches Wireless APs VPN Managed Endpoints UnManaged Endpoints Endpoint Assessment • Aruba • Cisco • HP • Enterasys • Extreme • Juniper • Foundry (Brocade) • and More • Aruba • Meru • Meraki • Cisco • Enterasys • Motorola • Xirrus • and More • Aruba • Cisco • Juniper • SonicWall • F5 • Check Point • and More • Windows • Mac • Linux • iPhone/iPad • Android • Printers • VoIP Phones • Medical Devices • MFG. Devices • Security Equipment (cameras, etc.) • NAP, NAC • A/V, A/S • Firewall • Discovery • Patch Management • Vulnerability & Port Scans Adaptable to any customer infrastructure
  • 6. Aruba Networks, Inc. 6 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper IT organizations need the flexibility to define policies based on multiple variables, including: • When and where a given type of device, such as a smartphone, can be used. • What resources that specific user is allowed to access via that device. • What services and applications the user can run from that device. • How much bandwidth a given device or application is allowed to consume. Siloed visibility IT needs a solution that provides complete visibility into what IT-managed and BYOD devices are admitted onto the network. Real-time visibility, including device profiling, is a prerequisite for granular access control as well as for reporting, planning, auditing and compliance. For example, only with these tools in place can IT verify that the chief financial officer’s lost smartphone hasn’t been used to gain access to sensitive data. A siloed model often requires the IT to monitor multiple tools, which is counterproductive. Simplicity and automation Solutions that lack basic onboarding and per-session data force organizations to spend less time on business-critical projects and more time performing manual troubleshooting and diagnostics. While it may seem daunting to support BYOD, organizations can embrace this trend by taking a holistic approach that automates processes and takes into consideration IT and user requirements as well as work habits. When BYOD works Organizations can reap a wide range of benefits by embracing BYOD initiatives, including the ability to quickly support user needs and devices, boost productivity, and in many cases, reduce expenses. One of the first things to consider when deploying secure BYOD is a simplified workflow that can accommodate all device types, work with the existing infrastructure, and allows organizations to start small, measure progress and then easily support additional requirements on the base platform as needed. BYOD access deployment strategy Implement and Adjust Prohibit Only allow corporate specic devices IT designated devices IT managed devices Limit Internet and select resources Select BYOD devices User managed devices Trust Full access Differentiated BYOD devices IT provisioned, user managed devices Embrace Any device, any location access Multiple differentiated BYOD devices per user IT and user provisioned
  • 7. Aruba Networks, Inc. 7 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper To address these challenges, Aruba Networks® developed the ClearPass Access Management System™. A key part of the Aruba Mobile Virtual Enterprise (MOVE) architecture, ClearPass provides a user- and device-independent framework that tackles any BYOD initiative, large or small, by providing: • Self-service onboarding, provisioning and revocation of access for all major mobile devices. • Device identification as a basis for grooming traffic and improving network security. • Consistent policy enforcement across multivendor wireless, wired and VPNs. • Controlled access and remediation for compromised devices. • Secure guest network access with simplified workflows. • Enhanced security, reporting and regulatory compliance. Device onboarding, provisioning and profiling A BYOD solution must automate the authentication and device onboarding process so that employees, contractors, students and guests can self-register devices for secure access to secure wireless and wired networks, as well as VPNs. Supported device types: Operating Systems Wi-Fi Access Wired Access Versions Windows Yes Yes Windows 7, Vista, XP iOS Yes N/A 4.x and up Mac OS X Yes Yes 10.5 and up Android Yes N/A 2.1 and up Underlying complexity must also be removed to easily configure network and posture assessment settings, and provision and revoke certificates or unique device credentials to ensure that only approved devices are used. User and device information captured during self-registration and device profiling will allow organizations to create and manage policies that are far more granular than those where only baseline fingerprinting or using MAC address authentication is performed. Profiling should include baseline dynamic host-configuration protocol (DHCP) fingerprinting and browser detection, as well as collecting detailed information from sources such as agents, RADIUS authentication servers, and Active Directory data. Policy management based on user roles and devices The administration and enforcement of policies based on user role and device type lets organizations create and enforce policies that apply to a group of users or devices. It also leverages other contextual information that pertains to either the user or device within policy enforcement. For example, organizations can ensure that access to appropriate data is different for the engineering staff versus the finance staff to satisfy internal and external compliance mandates. Additional contextual data on device roles ensure that access for known laptops is different from iPads that have Internet-only access through a BYOD program. No two organizations are exactly alike, so BYOD has different connotations depending on who you talk to. To some users, like a doctor, it means bringing a laptop or tablet to work and accessing electronic medical records (EMR). To a college professor, it may mean hosting a conference, easily acquiring guest access for each user and ensuring secure access regardless of the type of device.
  • 8. Aruba Networks, Inc. 8 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper An effective BYOD access management solution must be vendor neutral, based on open standards, and leverage an enterprise’s existing security, identity and network infrastructure. Policy enforcement methods must have the flexibility to satisfy the majority of use cases that organizations want to support, such as role-based policy management, VLAN steering and SNMP enforcement for captive portals. In the aforementioned examples, policies can be enforced across any network – wireless, wired and VPN. Identity stores, user-roles, and authentication methods are updated as the policy system receives real-time profiling and visibility information. Identifying and remediating compromised devices A BYOD access solution should provide enterprise-class posture assessment and remediation that’s a cut above ordinary network access control (NAC) offerings. It must go well beyond traditional health checks to also examine a device’s runtime configuration and applications, and whether USB storage devices are allowed. The ability to use permanent and dissolvable agents is important as many of these devices will be administratively managed by the user. Dissolvable agents for BYOD reduce administrative overhead as they are downloaded during a captive portal login and removed once the web page is closed. In addition, enterprise-class posture assessment solutions typically compare the posture/health information against policies defined in a centralized policy decision point (PDP). For a BYOD access management solution to be effective, the PDP must have the ability to automatically quarantine non-compliant BYOD and IT-issued devices using role-based mechanisms or VLAN steering methods. As part of a comprehensive posture assessment approach, a BYOD access solution should: • Perform automated checks via persistent and dissolvable agents. • Check for up-to-date antivirus, antispyware and firewall software. • Check for USB storage and peer-to-peer applications and services, such as Skype and BitTorrent. • Provide control options, including protected network access, manual and auto-remediation via directed URLs, and denial of service. Finally, tying posture information with identity-related and other contextual data allows organizations to enforce differentiated policies as business needs dictate. Guest Wi-Fi access The definition of a guest user is much more complex now and could mean anything from a temporary contract employee to a shopper in a retail environment. As a result, a BYOD access management solution must provide similar capabilities for guests as well as for employees – including dynamic provisioning, profiling and role differentiation – which are needed to ensure that compliance requirements are met. Many organizations restrict guests to an isolated network segment, such as using a separate SSID from the corporate SSID, and provide Internet access only. However, the BYOD access solution should give IT the flexibility to create different access rules for different types of visitors. In addition, a guest solution must be easy to use, support multi-tiered administration and sponsor capabilities, and automate the ability to include contextual elements within policies that take into account time-of-day and day-of-week privileges. For example, when a guest enters information requesting access, the BYOD access solution must have the ability to create an account that sits in a disabled state until an approved sponsor has verified and approved the request. Automated methods must exist that deliver access credentials over SMS or email once approval has been received by the system.
  • 9. Aruba Networks, Inc. 9 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper Visibility and reporting To address compliance and regulatory requirements, collection of transactional data for each user session offers IT and business managers a variety of deployment, troubleshooting, and reporting options. Web-based management. Providing IT staff with web-based access to the entire policy management system without requiring dedicated appliances or licenses ensures ease of use and a lower total cost of ownership. ClearPass Policy Manager dashboard Centralized policy management. In large deployments, IT needs management capabilities from a central location to ensure that policies are effectively deployed and managed to adhere to organization and user needs. For example, IT staff in Los Angeles should be able to define policies for remote workers in India or China. The time and cost savings are easily recognized – resources and travel budgets are not required to support new users and use cases or to perform troubleshooting. Multiple administration levels and role-based access. While policy management must be centralized to ensure consistency, organizations need the flexibility to administer policy management in a distributed fashion. A BYOD access solution must support a range of administration levels and role-based administration across the security, IT and helpdesk organizations. Access analytics and reporting. Visibility into access activity is crucial to meet compliance requirements and enhance the effectiveness of network access policies. A BYOD access solution must provide IT with advanced reporting capabilities that monitor current and archived access activity, generate a variety of reports, and analyze data based on access parameters by role, class of device and access location. IT also needs the ability to aggregate data, as well as apply filters and drill down for in-depth views.
  • 10. Aruba Networks, Inc. 10 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper The Aruba ClearPass access management platform Aruba understands the challenges that organizations face when implementing an access solution that is robust yet flexible enough to handle the burgeoning BYOD trend. Aruba ClearPass is the only standards-based BYOD solution that provides access control as a non-disruptive overlay to an organization’s existing network. Open framework BYOD architecture ClearPass Policy Manager Remote Access Point VIA Client • Core AA • Certificate Authority • Device Profiler • Guest Access • Device Onboarding • Posture Assessment Active Directory Server LDAP Store Public Access Network Core Security Services OnGuard Agent Enterprise Access Network xxxx xxxx xxxx xxxx xxxx ClearPass Policy Manager As a result, an organization can leverage its existing network, identity and security infrastructure and simply turn on ClearPass functionality as needed. It’s a very cost-effective and adaptable approach that enables organizations to implement a BYOD solution that’s tailored to their particular needs. The ClearPass Access Management System includes the ClearPass Policy Manager appliance and the following feature-rich software modules: • ClearPass Onboard • ClearPass Profile • ClearPass Guest • ClearPass OnGuard A separate cloud-based application, ClearPass QuickConnect, makes it easy for users to self-configure 802.1X settings on their Windows, Mac OS X, iOS, Android and Linux devices for network authentication and connectivity. ClearPass Policy Manager The ClearPass Policy Manager combines all the capabilities of a robust BYOD solution on one platform. This central policy server provides differentiated, context-based access control, along with operational utilities designed to reduce IT overhead.
  • 11. Aruba Networks, Inc. 11 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper With ClearPass Policy Manager, IT can easily automate and extend authentication and authorization policies across the entire organization for wireless, wired, VPN and guest access applications. Differentiated access capabilities based on a variety of attributes, including user role, device, time, and location are also available. In addition to its integrated policy management engine, RADIUS and TACACS+ servers for AAA support, the ClearPass Policy Manager can read from multiple identity stores and databases, including those based on Microsoft Active Directory, LDAP, SQL and Kerberos. This provides a unified policy model that ensures access controls are applied consistently across the organization. Hardware and virtual machine (VM) options provide organizations flexibility in the form factor they choose and the ability to mix and match hardware-based appliances and VM implementations with no discrepancy in features or functionality. Using VMs, for example, can reduce cost and complexity by lowering power and cooling requirements and simplifying cabling. Similarly, hardware appliances may be the best choice in larger data centers, while the VM option can be added to a server in remote offices when cost is a concern. Redundancy and failover is mandatory for an enterprise-wide policy server. Rather than dedicating a fully redundant appliance to passive/standby in an active/passive model, the ideal access management solution should support fault tolerance using a publisher-subscriber model. In this model, a primary server replicates or publishes all changes to one or more secondary servers. This approach is more flexible than other clustering models. ClearPass Onboard ClearPass Onboard, the enterprise provisioning software module for ClearPass Policy Manager, fully automates device onboarding for IT via a built-in administration interface. It offers full self-service provisioning for Windows, Mac OS X, iOS, and Android devices, and includes the configuration of 802.1X settings as well as the distribution and revocation of unique device credentials. Additional features include the ability to push configuration settings for mobile email with Exchange ActiveSync and VPN clients for some device types. ClearPass Profile ClearPass Profile, the device profiling software module for ClearPass Policy Manager, uses a five-tier system that includes DHCP and other advanced methods as well as end-user and device fingerprinting and profile information. Device-level information includes details such as operating system version, manufacturer and device category. This contextual information is stored and used to enhance policy decisions and to identify changes in a device’s profile, which in turn dynamically changes authorization privileges. For example, policies can be used to differentiate access for an employee’s company-issued device versus the same employee’s personally-owned device. ClearPass Onboard
  • 12. Aruba Networks, Inc. 12 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper ClearPass Guest The ClearPass Guest software module for ClearPass Policy Manager enables IT as well as non-technical personnel to manage guest Wi-Fi accounts and onboarding tasks when providing network access for visitors in large and small environments. In addition to allowing employees and guests to self-register their own devices, ClearPass Guest supports role-based access controls, activity tracking for compliance and auditing, and unique features such as advertising and commercial-grade hotspot services. ClearPass OnGuard The ClearPass OnGuard software module for ClearPass Policy Manager enables comprehensive posture assessments that minimize the risk of viruses and the misuse of applications and services before devices connect to the network. Supporting persistent and dissolvable agents, including vendor-specific agents such as Microsoft Windows native supplicants, ClearPass OnGuard performs posture assessments on devices running Windows, Mac OS X and Linux operating systems, checking for the presence of anti-virus, anti-spyware, and firewall software from more than 80 vendors. In addition, ClearPass OnGuard checks for allowable services, processes, peer-to-peer applications like Skype, USB storage devices, VM clients, and hot spots, and provides auto-remediation or quarantine as organization policies require. ClearPass QuickConnect ClearPass QuickConnect is a cloud-based service that provides simple self-service 802.1X configuration for Windows, Mac OS X, iOS and Android devices, reducing the overhead burden on IT. IT configures endpoint variables to create network authentication packages, while users are presented with a configuration wizard via a captive web portal, Active Directory group policy object (GPO), USB device or CD. Users simply start the wizard, enter their credentials and connect to the network in minutes. Automated posture and health remediation Successful Authentication Failed Policy
  • 13. Aruba Networks, Inc. 13 Conquering Today’s Bring Your Own Device Challenges Aruba White Paper Meeting the BYOD challenge with Aruba As BYOD initiatives proliferate, organizations are under pressure to simplify the process of connecting new users and devices while maintaining strong security and keeping costs down. The Aruba ClearPass Access Management System is the industry’s first BYOD platform that takes a holistic approach to securing the mobile user, devices and network infrastructure. ClearPass provides a comprehensive standards-based, vendor-neutral solution that enforces access policies across any network, any device and any user. The ClearPass advantage Aruba ClearPass provides a simple, cost-effective and multivendor approach to connecting and securing BYOD and IT-managed users and devices. ClearPass delivers the following advantages for successful BYOD today: • User and device self-registration and onboarding to reduce the burden on IT. • Ability to deploy with Aruba access networks or existing infrastructure. • Unified visibility and control from a single platform. • The industry’s most intuitive administrative interface. • Centralized policy management and enforcement. • A consistent user experience regardless of device or location. For further information and assistance regarding BYOD best practices, contact Aruba Networks to discuss your BYOD lifecycle plan. Comprehensive IT and user initiated BYOD workflow Onboard Device 1 Join Domain 2 Control Device Access 3 Visibility Reporting 4
  • 14. Conquering Today’s Bring Your Own Device Challenges Aruba White Paper © 2012 Aruba Networks, Inc. Aruba Networks’ trademarks include AirWave®, Aruba Networks®, Aruba Wireless Networks®, the registered Aruba the Mobile Edge Company logo, Aruba Mobility Management System®, Mobile Edge Architecture®, People Move. Networks Must Follow®, RFProtect®, and Green Island®. All rights reserved. All other trademarks are the property of their respective owners. WP_BYOD_071212 1344 Crossman Avenue. Sunnyvale, CA 94089 1-866-55-ARUBA | Tel. +1 408.227.4500 | Fax. +1 408.227.4550 | info@arubanetworks.com www.arubanetworks.com About Aruba Networks, Inc. Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. The company’s Mobile Virtual Enterprise (MOVE) architecture unifies wired and wireless network infrastructures into one seamless access solution for corporate headquarters, mobile business professionals, remote workers and guests. This unified approach to access networks dramatically improves productivity and lowers capital and operational costs. Listed on the NASDAQ and Russell 2000® Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, and Asia Pacific regions. To learn more, visit Aruba at www.arubanetworks.com. For real-time news updates follow Aruba on Twitter and Facebook.