BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.

Slides:



Advertisements
Similar presentations
Mobile Device Protocol Sunil Vallamkonda 11/19/2012.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Technology Requirements for Online Testing Online Training Module for the Smarter Balanced Assessment.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
Enterprise Mobility Platform Microsoft Differentiation Managed Mobile Productivity Layered Protection Hybrid Solutions Office 365DynamicsWorkday.
Implementing Mobile Learning – Technical process Pete Stockley, 2012.
IT’s Gone Mobile: How to do your Job Anywhere Jason Hand IT Specialist, Central NM Electric Cooperative Jason Hand Cell:
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
1 Enabling Secure Internet Access with ISA Server.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Networking Components
Your storage on the ground; Your files in the cloud.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Microsoft Windows 8.1 Enterprise: A brief overview of Microsoft Windows 8 Enhancements. Welcome!
Chris Nilsson n.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Altai Certification Training Backend Network Planning
Education roaming Secure Wireless Service for Research and Education.
Deploying Chromebooks RICK NICHOLAS A.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Integrating and Troubleshooting Citrix Access Gateway.
Security fundamentals Topic 10 Securing the network perimeter.
User and Device Management
Why Window’s Firewall? Free and included with the OS Easy to use Management is thru Active Directory Windows Firewall.
LO2 Understand the key components used in networking.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Technology Requirements for Online Testing Training Module Copyright © 2014 American Institutes for Research. All rights reserved.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
Security fundamentals
MaaS360 MDM for iOS, Android & Windows Phone 7
Phase 4: Manage Deployment
Barracuda Mobile Device Manager
Product Overview.
Installing TMG & Choosing a Client Type
Barracuda Web Security Flex
Configure Instruction
Mobile Data Solutions Inc
Product Overview.
PaperCutMF Product Overview – Konica Minolta
Product Overview.
Firewalls Jiang Long Spring 2002.
Chapter 10: Advanced Cisco Adaptive Security Appliance
A Glimpse Into a Few Current Tech Projects
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Product Overview.
IT Management, Simplified
Presentation transcript:

BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN

Topics Bring Your Own vs School Managed Devices Policy considerations Network access and security Web filtering Mobile Device Management Why apps might not work - filtering and firewalls Q&A Copyright 2013 E2BN

What is BYOD ? The use of personal mobile devices in the: – Workplace – School, college or University – Public Library Wi-fi connection provided by the organisation Copyright 2013 E2BN

What is BYOD ? True BYOD – Owned by the user – Managed by the user – Not know to the school network – Untrusted Copyright 2013 E2BN

SMMD – School Managed School Managed Mobile Devices - SMMD Sourced by the school Owned or loaned by the school Managed by the school Copyright 2013 E2BN

Considerations Preparation for BYOD & SMMD What is the purpose ? Understand and manage expectations Are compliance and Acceptable Use rules required ? What range of devices can be supported ? Copyright 2013 E2BN

BYOD & SMMD Network Access First point of control is the Wi-fi network How do devices join ? Anonymous vs personal authentication DHCP controls Wireless controller systems e.g. – Ruckus – Aerohive Copyright 2013 E2BN

Network Segregation Controlling access to the managed/trusted network Flat networks – broadcast domains Subnets, Vlans and routing/firewall – points of control Copyright 2013 E2BN

Device Management - wish list Providing settings e.g. Wireless and Proxy Compliance Restrictions Application installation Monitoring Remote wipe Copyright 2013 E2BN

Device Management – BYOD True BYOD – Hands off approach ? – Minimum is filtering settings ? – Many devices support Web Proxy Auto Detection ( WPAD ) – Transparent filtering options Copyright 2013 E2BN

Proxy Auto Configuration Device support for WPAD – Web Proxy Auto Detection. Hosting a wpad.dat file - web server Setting up DHCP and DNS Copyright 2013 E2BN

DHCP method Copyright 2013 E2BN

DNS Method Copyright 2013 E2BN

Wpad.dat - PAC File Example function FindProxyForURL(url, host) { if (isInNet(host," "," ")) return "DIRECT"; return "PROXY :8084"; } Copyright 2013 E2BN

Device Management - platforms Apple iOS – Apple Configurator Android – Samsung Smart Schools Chromebook – Google Apps dashboard Multi OS, “over the air” MDM systems Copyright 2013 E2BN

Apple Configurator Free of charge but you do need.. Apple MAC, including MAC-mini Devices connect via USB ( hub, cart) Bulk deployment of common profile(s) Deploy apps, restrictions, web clips, settings Deploy IOS updates Copyright 2013 E2BN

Apple Configurator Copyright 2013 E2BN

Over-the-Air MDM Typically : – Web based administration – Device enrollment via web / app – Configure and deploy apps, settings, restrictions, web clips etc – Inventory tracking, GPS tracking Meraki – free Airwatch Lightspeed systems MDM Copyright 2013 E2BN

Over The Air MDM Copyright 2013 E2BN

Why Apps might not work 1.Filtering App is possibly sending request via web filters but site is being blocked in the background. Try the least restrictive profile e.g. E2BN Staff Copyright 2013 E2BN

Why Apps might not work 2. Firewalling App is sending request(s) direct to the internet but is being blocked by school / LA firewall. Copyright 2013 E2BN

Firewalls Home vs School comparison Some history and traditional LA approach – Walled garden, local content, proxy services – Device and network security Copyright 2013 E2BN

Firewalls – accommodating apps Tcp port 80 and 443 – raw web access Other ports – Single port – Multiple ports Cloud, distributed services, multiple remote IP addresses Copyright 2013 E2BN

Firewalls – accommodating apps Next Generation firewalls Application aware Device aware User aware Copyright 2013 E2BN

Thank You Useful Document – Workshop Evaluation - conference brochure Assistance with tech for E2BN Schools & LAs – Copyright 2013 E2BN