BYOD is becoming an irreversible trend.

Source: Internet
Author: User
Keywords Safety self-carrying equipment
Tags access access control application applications carrying company control data

Absrtact: Driven by the popularity of smartphones and tablets, BYOD (bring your own device) is becoming an irreversible trend. BYOD refers to the user to carry their own equipment office, including personal computers, mobile phones, tablets and other mobile intelligent terminal equipment, in

Driven by the popularity of smartphones and tablets, BYOD (bring your own device) is becoming an irreversible trend.

BYOD refers to the user to carry their own equipment office, including personal computers, mobile phones, tablets and other mobile intelligent terminal equipment, in airports, hotels, cafes and so on, login company mailbox, online Office system, not by time, place, equipment, personnel, network environment restrictions.

IDC predicts that 1.2 billion people will be moving outside the company in 2013, with 69% of users saying they will use their smart terminals to access the company's network. Gartner forecasts that, by 2013, 65% of companies will support employees using smart terminals to move their offices.

One obvious benefit is that BYOD can help companies save on office costs, while at the same time, the risks to the enterprise are obvious: the risk of data migration, loss of mobile devices, access to unknown public WiFi, and so on to increase the risk of private leakage of enterprises, information and data security will be seriously challenged.

For a time, the traditional it enterprises flocked to BYOD, Juniper Network, Cisco, H3C and Aruba and other manufacturers have put forward their own solutions, in order to crack BYOD freedom under the security dilemma.

"Terminal recognition and management, the enhancement of network infrastructure, the BYOD to meet the security risks brought by the mobile office and the open demand of the system are the four problems that enterprises must face in the Byod era." H3C, Deputy Minister of Technology marketing, Shong said.

The precision area separates into the difficulty

From the user side, the identification of terminal equipment is the starting point to solve the BYOD problem. For example, the type of device used by the user. is a PC, notebook or smartphone, tablet computer and other mobile smart devices. The middle will involve the equipment operating system, manufacturer, IMEI code and other information. On the other hand, is the user's use of equipment attribution problem. For example, the equipment is owned by the company or belongs to the individual employees, which directly affect the enterprise management of equipment, as well as the protection of personal information of employees.

In view of these, H3C provides the DHCP fingerprint identification, the Http agent recognition and the Mac Oui recognition technology and so on to solve the BYOD the starting point question to give a reference.

The difficulty of BYOD is the different network type, the access location becomes a new problem. Especially in the wired, wireless network, IT administrators in order to accommodate the visitors and employees of the network access, usually set multiple SSID, and do not enable WPA2 and other strong security access control, how to control the different SSID access to the crowd, become a difficult problem to solve.

At the same time, some important resources within the enterprise, such as the financial server, for security reasons, only allow specific personnel at specific locations, specific time access. These require access control system to be able to perceive the network type, the perceived access location and other information, and based on this information for effective control.

In this context, H3C upgraded the IMC UAM component, showing the network type, SSID information and access location information to the administrator, giving it a clear picture of the network's internal terminals.

As the Aruba Company's Clearpass Access system components Aruba Workspace, can integrate the network control function and the application and the equipment management function into a single platform, H3C also has the IMC Intelligent Management Center, can realize the terminal, the network, the application integration management.

Security extension

Terminal security, network security, data security has become the three major problems in the BYOD era. The category of Go-and-conquer, become a business challenge.

For example, on the network security side, through the establishment of a security resource pool, with the help of virtualization technology, the virtual processing of hardware resources, virtual into multiple logical units, on demand dynamically allocated to different user groups.

The data security side needs to be more subdivided. In the management of mobile devices, through Remote lock screen, file encryption, remote location and remote data erasure, etc., on the other hand, the use of desktop virtualization technology, the data can be edited and saved in the cloud in the data center, the terminal is only to display.

It is undeniable that, in the BYOD era, rich terminal type, massive app and rich peripheral system have put forward a strong opening requirement for BYOD system. For example, Office applications from the traditional PC to the intelligent terminal smooth push, and the company's existing system docking (CA, AD, ERP, etc.), and app linkage.

H3C's BYOD architecture, is an open architecture, while providing the opening interface, there are specialized customized development team, can provide users with tailored professional customized services to solve the BYOD tide needs to face the vast majority of problems.

Aruba will launch a mobile device management Partner Program to achieve the integration of "Network + equipment + Application Management". Currently, more than 40 mobile applications have been integrated into Aruba WorkSpace.

Although the BYOD has become a trend, it manufacturers have launched a solution just in the early days, the future evolution continues.

According to the evolution Route of H3C, 1.0 program main open cooperation, 2.0 program will be the main depth fusion and the best user experience program, to 3.0 version is fully oriented to mobile Office applications.

"First work with product solutions to create BYOD eco-chains, and then integrate resources to provide integrated solutions." On this basis, compatible with existing networks, protect user investment, achieve smooth evolution. "Shong said.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.