A Little BYOD History...
Enterprises have been concerned about the Bring Your Own Device practices of employees for some time. A little over a year ago, a report by Accenture noted that 45 percent of employees find personal devices and applications more useful than those provided by their enterprise.1 Sixty-six percent donít worry about their organizationís IT policies because they just use the technologies they need to do their work. Twenty-three percent use their own devices for work regularly, and 27 percent use non-corporate applications to improve their productivity at work.
At the time, this report and others focused on explaining the growing bring your own device (BYOD) trend enterprises of all sizes were facing. One year later, Gartner reports that this trend is becoming more accepted by enterprise IT teams worldwide. In fact, Gartner states enterprise programs designed to leverage BYOD are becoming more commonplace and that by 2016, 38 percent of companies expect to stop providing hardware devices to employees.
The proliferation and diversity of communication technologies, media and devices, combined with the popularity of remote working have created a technical nightmare for users and IT managers alike. Since the Bring Your Own Device (BYOD) trend is inevitable, organizations must find a way to adapt, overcome their BYOD concerns and take advantage of the new reality.
Embrace BYOD Whilst Maintaining Security
The Alcatel-Lucent implementation of BYOD in the Converged Campus Network Solution is based on intelligent device fingerprinting and policy management. These capabilities ensure that the right people with approved devices can get to the communications resources they need and that they receive a high quality experience when they use them. They also restrict unauthorized personnel or non-compliant devices from accessing corporate resources.
Once the device is known, decisions can be made about how to handle the device and the communications applications it is using. This is achieved with:
- A strong access control and authorization mechanism, which authenticates both the user and the device
- A posture check, which identifies any non-corporate device that attempts to enter the network and prevents unauthorized applications from using network bandwidth or violating company policies. This ensures that devices connecting to the network do not contain viruses or malicious threats and are not going to infect the network or other devices
- A quality of service (QoS) and prioritization mechanism, which ensures that all approved applications function properly when they are on the network, and that all traffic is prioritized based on the type of communications the applications generate