180 likes | 389 Views
BYOD Guide. Created using iThoughts [...]. BYOD Guide. Introduction. Who is this for? Implications of BYOD Implications of no BYOD What is your policy? Authentication End Point Security Access Control. Discovery. Type/Class of Device Class of Device IT Managed User Managed
E N D
BYOD Guide Created using iThoughts[...]
Introduction • Who is this for? • Implications of BYOD • Implications of no BYOD • What is your policy? • Authentication • End Point Security • Access Control
Discovery • Type/Class of Device • Class of Device • IT Managed • User Managed • Type of Device • Laptop • Tablet • Smart Phone • Other
Discovery • Type/Class of User • Known • Super User • Departmental User • Contractor • Unknown • Contractor • Guest
Discovery • Location • Office • Home • Public Wi-Fi Hote Spot • Hotel • Non-corporate Office • Time of Day/Day of Week
Discovery • Bandwidth Allocation • Per Device • Per User • Per Application • Application/Service
Telephony Support • Type/Class of Device • Features • Single Number • Presence • Mobility
Define Access Policies • Security Policy Alignment • Network Services • Known User • HR Involvement • New Employee Policy • Leavers Policy • IT Managed Device • Laptop • Tablet
Define Access Policies • User Managed Device • Corporate Location • Home • Other Location • Unknown User • User Managed Device • Corporate Location • Telephony • Corporate Handset
Define Access Policies • Staff • Contractor • Personal Handset • Staff • Contractor • HR Involvement • New Employee Policy • Leavers Policy
Design, Specification & Deployment • Goals - what do you want to achieve? • Design & Architecture • Resilience/Redundancy • Integration • Define User Groups • Profile - what can we find out about the device? • Posture - what are we checking?
Design, Specification & Deployment • Enforcement - what action do we take? • Implementation - how do we install? • Setting Expectations • Determine Timescales • Scheduling • User Group Regression Plans • Proof of Concept
Design, Specification & Deployment • Users • User Devices • Objectives • Pre-test • Success Criteria • Stakeholders • Sign Off
Management • On Boarding • IT Staff Impact • Automation • Monitoring • Diagnostics • Logging • Compliance and Auditing
Management • Reporting • Alarms • Incident Response • Revocation • Security Policy Aligment • Users • IT Managed Device
Management • User Managed Device • HR Implications • Change Management • Security Audit • Review Process
Next Steps • http://www.astro.co.uk/byod/byod-resource • Call Marie on +44 (0)1322 610 178 • Email Marie - mcronin@astro.co.uk