What advice would you give to a company trying to cope with an increasing number of private mobile devices on its network?
Be careful what you ask for. While there are clear benefits, there are less obvious hidden challenges. Again, not all devices have the same traffic profile and understanding and managing that traffic is an iterative process that requires tools that can provide visibility to the data and enable desired mitigation schemes. Policy enforcement solutions can assist on both of these fronts, but the network manager needs to come to understand the subtleties involved.
We have nearly ten years of experience in this realm and have learned many lessons the hard way. Our customers and prospects benefit from our advice. Just be aware that you are going from a network where you had all the answers based on common build practice to one that is a little bit out of your control. New applications are coming out by the second and your users are going to find them and expect to use them over the corporate network. Embrace it, because you can’t stop it.
Having granular visibility into network traffic patterns and behaviors is important. Understanding new applications and their traffic impact is equally critical. This is why we update our traffic signature recognition database weekly. The environment we operate in requires this velocity and time to value. Some IT people may find the speed with which change occurs a little harrowing—because it is—but that is the new normal. The vendors that have come to grips with this can be great resources, and corporate IT departments that accept this new reality will have better results trying to manage it. It may be daunting at times but it is not something that we control, so we run with it and so far, so good.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.