BYOD challenges for large organizations
by Mirko Zorz - Editor in Chief - Friday, 28 December 2012.
The most pressing danger though is the lack of any real baseline of network behavior. BYOD devices on the whole are Internet dependent and they bring with them a traffic burden, and corresponding connection addition, to the network. We see clear differences between devices and some bring bigger burdens than others, but understanding that and applying policies to keep that in check are increasingly important.

What advice would you give to a company trying to cope with an increasing number of private mobile devices on its network?

Be careful what you ask for. While there are clear benefits, there are less obvious hidden challenges. Again, not all devices have the same traffic profile and understanding and managing that traffic is an iterative process that requires tools that can provide visibility to the data and enable desired mitigation schemes. Policy enforcement solutions can assist on both of these fronts, but the network manager needs to come to understand the subtleties involved.

We have nearly ten years of experience in this realm and have learned many lessons the hard way. Our customers and prospects benefit from our advice. Just be aware that you are going from a network where you had all the answers based on common build practice to one that is a little bit out of your control. New applications are coming out by the second and your users are going to find them and expect to use them over the corporate network. Embrace it, because you can’t stop it.

Having granular visibility into network traffic patterns and behaviors is important. Understanding new applications and their traffic impact is equally critical. This is why we update our traffic signature recognition database weekly. The environment we operate in requires this velocity and time to value. Some IT people may find the speed with which change occurs a little harrowing—because it is—but that is the new normal. The vendors that have come to grips with this can be great resources, and corporate IT departments that accept this new reality will have better results trying to manage it. It may be daunting at times but it is not something that we control, so we run with it and so far, so good.

Spotlight

Staples customers likely the latest victims of credit card breach

Posted on 21 October 2014.  |  Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //