Any challenge in supporting the increasing diversity of devices involved with BYOD?
Anytime you open the door for outside devices you have to ask yourself “what is technology’s role in your tech plan?” With a NAC solution you have the ability to detect what kind of device is trying to connect to your network; with policies you can determine what access to give. Furthermore the NAC solution can also detect if that device is “safe” for your network by detecting Anti-Virus setting to insure compliance.
Let’s face it: IT managers are not salesmen and often can be completely misunderstood with “geek speak”. With terms like BYOD, SNMP, NAC, MDM and even PC can become confusing to the non-initiated.
The key is to sell the sizzle not the steak.
In other words what decision makers want to hear is not BYOD but how awesome it will be if “Johnny” can bring his laptop he got for Christmas to do school work. Without having to do a lot of training for the teachers or risk to the network.
For years IT managers have been worried about people bringing their own technology into the classroom – what kind of viruses are they bringing onto the network? How many hours will be lost from support tickets from technology that’s not even owned by the school?
But as time progresses so did the realization that the funding level for technology maintenance and growth in schools are insufficient.
With a Network Access Control (NAC) a school can now set policies and provides a security gateway for newly connected machines. The NAC can provide flexibility to select and use policy modules needed to satisfy the requirements of their security plan and enforce them across the network. Read More: http://borderlan.com/byod-for-schools/
The SafeConnect NAC solution provides the flexibility to select and use only the policy modules needed to satisfy the requirements of their security plan. Administrators can implement the policy modules standard to the SafeConnect solution including compliance with anti-virus, anti-spyware, Microsoft OS patches, as well as registration and authentication.
Other standard policy modules include peer-to-peer file sharing, access points, and power management. Custom policies can also be created based on the existence or non-existence of file types, registry settings, services, and processes on endpoint devices.