1 / 27

Secure Bring Your Own Device (BYOD) for Higher Education

Secure Bring Your Own Device (BYOD) for Higher Education. Name Title Email. The Top Trends. Consumerization of IT Implication: The network will have to manage the very devices that are brought onto campus and access your applications. Virtualization Implication:

thiery
Download Presentation

Secure Bring Your Own Device (BYOD) for Higher Education

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Bring Your Own Device (BYOD)for Higher Education Name Title Email

  2. The Top Trends • Consumerization of IT • Implication: • The network will have to manage the very devices that are brought onto campus and access your applications • Virtualization • Implication: • All applications will be in the data center… • And VDI • Collaboration and the cloud • Implication: • Your application performance will be more dependent upon the network, than the application

  3. Shift towards Mobile Computing Feb. 14, 2011, Tablet Demand and Disruption

  4. Realities of Smart Devices, Like It Or Not… • A new smartphone comes out on Thursday • Bill, the faculty dean will buy one on Friday • He’ll ask how to use it on campus network on Friday • You still have to come to work on Monday • 72% of organizations are permitting the use of employee-owned devices—Aberdeen • 77% of smartphones used at work are chosen by an employee • 48% are chosen without regard for IT support

  5. BYOD – Bring Your Own Devicemeans using privately owned wireless and/or portable electronic piece of equipment that includes laptops, netbooks, iPods, tablets, iPod Touches, cell and smart phones to support academics and work.

  6. Student Technology Ownership in Higher Ed What are students bringing onto campuses? Source: Educause Center for Applied Research (ECAR) National study of students and information technology in higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy

  7. Student Technology Ownership in Higher Ed Students recognize major academic benefits of technology Source: ECAR National study of students and information technology in higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy

  8. The influx of consumer-owned devices into the education environment cannot be stopped How can we best incorporate student- and staff-owned devices into the curriculum and work “Bring your own device (BYOD) will become the prevalent practice in educational settings at all levels within the next five years.” Source: Gartner - BYOD in Education by Design, Not Default 3 May 2012, G00233448

  9. What are your top concerns and challenges of BYOD?

  10. The BYOD Challenge in Education BYOD Always-on Overwhelmed networks! Policy Security Who’s on our network? 4 devices per student? IT staff overloaded! Can’t connect!

  11. Readiness Challenges to BYOD “Have you considered the implications of BYOD on your network?” Do you have business partners and guest who are frustrated by their inability to get the information they need when they need it? Only 9% of organizations are fully aware of the devices accessing their network… are you? Do you worry it’s simply a matter of time before a security or compliance breach occurs due to the use of personal devices? Analysts predict 80% of newly installed WLANs will be obsolete by 2015 due to BYOD. Are you concerned? Is your wireless network ready to support video?

  12. What if… • Partners and guests were given the right level of access to the appropriate resources in seconds • You could onboard personal devices to campus networks in minutes • You could fingerprint user devices to have complete visibility, security and control over the network • You could deploy a video-ready wireless network capable of handling the massive growth

  13. A step-by-step process to enable BYOD Open the door with Guest Access Support access for visitors, business partners & contractors Allows students, faculty and staff to use their personal devices for academic and work Expand into Access Control Introduce Wireless considerations Provides a “BYOD ready” campus wireless network

  14. Open the door with Guest Access Over 90% of organizations do not offer Guest Access today because… “I don’t want to expose my network infrastructure to security breaches” “It’s too costly… I’d need to build a parallel separate infrastructure” “Provisioning is manual & painful. I need the MAC address of devices, I need to modify the data base for access control, etc….”

  15. Open the door with Guest Access What’s required: A Secure and Simpler way to address Guest Access….. Authenticated Network Access Identity and Network Access Control with Guest Management Should: • Provision guests in seconds • Offer a self provisioning kiosk • Provide detailed tracking and auditing

  16. Authenticated Network Access Identity and Network Access Control Identity and NetworkAccess Control Corporate Directories Identity Engines Unified wired and wireless access Institution’s Enterprise LAN Institution’s Enterprise WLAN Internet and VPN BYOD and Guest access management

  17. BYOD challenges…. Expand into Access Control Security To prevent unauthorized access and allow access who needs it Track where and what they access IT Compliance To enforce ‘who get’s on, to do what, to go where’ Quality of Service To ensure business critical applications get priority Network Capacity To accommodate growth and collaborative applications

  18. Secure and Enforce IT ComplianceHR employee example Expand into Access Control IF(identity = HR employee) AND IF (device = corp laptop) AND IF (medium = wired) THEN ALLOW & GRANTFULL ACCESS • Identity and Network Access Control Case 1 Employee with corporate laptop IF(identity = HR employee) AND IF(device = personal iPad) AND IF (medium = wireless) THEN ALLOW & GRANTLIMITED ACCESS Case 2 Employee with personal iPad (same corporate credentials)

  19. Introduce Wireless considerations Enterprises deploying iPads will need 300% more Wi-Fi • 70% of new enterprise users by 2013 will be wireless by default and wired by exception • Video soft clients growing at 340% through 2015 • In the past WLANs were deployed for convenience; they were not designed for pervasive Wi-Fi services, real time communication and high throughput

  20. Evaluating Network Solutions • Network Architecture • Ethernet routing and switching • Wireless LAN • Security • Identity management • Network management • Remote access

  21. Avaya Wireless LAN 8100 Series Combines 802.11n standard with an unified wireless/wired architecture for schools • Greater wireless capacity, performance, and coverage through 802.11n • Reduce costs by offering a simplified network infrastructure • Optimized for real-time applications such as voice, unified communications and video 31% 23% 31% More video call sessions than competitive average 23% More VoWLAN call sessions than competitive average Source: Miercom 2011 Avaya Test Reports

  22. Avaya Ethernet Routing Switches Get you campus wired network ready for BYOD and mobile learning Range of core and access switches for entry-level locations through high-performance Wiring Closet, to Campus Core and Data Center applications 7x 25x 36% 40% 233% <1 sec. 36% Less edge energy consumption 40% Lower edge total cost of ownership 233% Greater stackable traffic capacity Certified sub-second failover Up to 25x faster time to service for virtual network provisioning than Spanning Tree Up to 7x faster time to service for virtual network provisioning than Switch Clustering Source: Miercom 2011 Avaya Test Reports

  23. Avaya Identity Engines Provides central policy decision needed to enforce role-based network access control • Unified wired and wireless • Vendor agnostic • Virtual appliance • Robust guest management • Granular policy engine • Sophisticated directory federation • Simple affordable licensing 3rd Generation Network Access and Control Solution www.avaya.com/usa/product/identity-engines-portfolio

  24. Summary Open the door with Guest Access Support access for visitors, business partners & contractors Allows students, faculty and staff to use their personal devices for academic and work Expand into Access Control Introduce Wireless considerations Provides a “BYOD ready” campus wireless network

  25. Mobile Learning/BYOD Whitepaper • New whitepaper from the Center for Digital Education • “Mobile Learning: Preparing for BYOD” • Get your free copy at: https://avaya.reg4events.com/events/bin/index.cgi?op=dR&eventid=421635&cid=&cmp=&em=

  26. To Learn More Visit: www.avaya.com/educationwww.avaya.com/networking or Speak with an Avaya representative toll free: 1-855-227-4919

More Related