Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

A strategic approach to BYOD in the workplace

Justin Chiah, Director and General Manager, South East Asia and Taiwan at Hewlett Packard and Aruba Networks | Feb. 23, 2016
Justin Chiah, Director and General Manager, South East Asia and Taiwan at Hewlett Packard and Aruba Networks, discusses how Adaptive Trust Defence allows business organisations and IT teams to take a strategic approach to addressing critical network access security challenges that BYOD and IoT bring.

3. Alleviating workload

Finally, the biggest challenge is that of managing network workload. Employees using resources on the corporate server for personal reasons, like video calling and online streaming, tend to take up bandwidth resources and inhibits productive work. IT administrator must be given a way to identify and monitor these personal devices to enable effective troubleshooting.

For example, IT may be offered the ability to blacklist devices. This adds another layer of security as IT can black list stolen devices to prevent them to be re-registered for access to the corporate network. Additionally, automated control of network traffic can be made available to allow for flexible management and deterring network overload or overburden.

Many IT teams are faced with overwhelming demand to support personal devices on their corporate network. After all, we are now living in a time where personal mobile devices have become part of our lifestyle. Many people carry several connected devices with them everywhere they go.

Business organizations that are prepared for the BYOD trend have in place a network infrastructure that is designed to offer comprehensive management and control over employee-owned mobile devices in the workplace. One with a strong positioning to capitalize on productivity-enhancing services, and allow for the systematic integration of personal devices into a corporate infrastructure. Most importantly, a network infrastructure that allows for the managing of user behavior, that ease self-service configuration whilst maintaining security, and that allows for automated network management.

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.