​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​

The Challenge of Device Diversity with BYOD

by

Any challenge in supporting the increasing diversity of devices involved with BYOD?

Anytime you open the door for outside devices you have to ask yourself “what is technology’s role in your tech plan?” With a NAC solution you have the ability to detect what kind of device is trying to connect to your network; with policies you can determine what access to give. Furthermore the NAC solution can also detect if that device is “safe” for your network by detecting Anti-Virus setting to insure compliance.

How to sell BYOD to Decision Makers

by

Let’s face it: IT managers are not salesmen and often can be completely misunderstood with “geek speak”. With terms like BYOD, SNMP, NAC, MDM and even PC can become confusing to the non-initiated.

The key is to sell the sizzle not the steak.

In other words what decision makers want to hear is not BYOD but how awesome it will be if “Johnny” can bring his laptop he got for Christmas to do school work. Without having to do a lot of training for the teachers or risk to the network.

Hurdles that go with BYOD

by

For years IT managers have been worried about people bringing their own technology into the classroom – what kind of viruses are they bringing onto the network? How many hours will be lost from support tickets from technology that’s not even owned by the school?

But as time progresses so did the realization that the funding level for technology maintenance and growth in schools are insufficient.

With a Network Access Control (NAC) a school can now set policies and provides a security gateway for newly connected machines. The NAC can provide flexibility to select and use policy modules needed to satisfy the requirements of their security plan and enforce them across the network. Read More: http://borderlan.com/byod-for-schools/

Why Go BYOD?

by

Technology is playing an increasing role in education every year – we have to have a greater density and access to technology. At one time it was a popular expression “10:1” that’s a ratio of ten students to computer but now “1:1” is becoming the standard.

Most decisions are made to move into BYOD comes with a realization that with schools limited budgets makes it impossible to reach the technology density required to be effective.

BorderLAN’s BYOD solution makes it possible for students to bring their own devices to school while at the same time maintaining required standards (Security, privacy and regulatory). Read More.

Overcoming the growing need for technology in schools

by

I was fascinated at the idea we might be able to overcome the fact we have a growing need to provide access to our students. Because of the kind of curriculum deliver we are faced with and that’s only going to become more important. Without having to expend massive amounts of money that we don’t have, to provide these technologies for the students.

The secret is that all these kids have parents/grandparents/guardians that give those kindles, iPads, laptops for birthdays, Christmas etc. Furthermore these kids are often better then us at using these technologies. So why wouldn’t we want to find a way to let the students bring these technologies on campus.

The problem is we have a number of things we have to deal with that are different than businesses like Starbucks. Among them are the CIPA/FIRPA regulations and the risk of allowing viruses into the network. BorderLAN’s BYOD solution allows non-organization owned devices to connect with less worry of security breaches, viruses and open policy. It’s also very easy to use and implement and enforce compliance with policies in place.

What is Safe Connect?

by

The SafeConnect NAC solution provides the flexibility to select and use only the policy modules needed to satisfy the requirements of their security plan. Administrators can implement the policy modules standard to the SafeConnect solution including compliance with anti-virus, anti-spyware, Microsoft OS patches, as well as registration and authentication.

Other standard policy modules include peer-to-peer file sharing, access points, and power management. Custom policies can also be created based on the existence or non-existence of file types, registry settings, services, and processes on endpoint devices.

Copyright © 2012 BorderLAN. All rights reserved.
Privacy policy | Terms of service
Find us on Google+