Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Is Wi-Fi Ready for This?.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Negotiating the Internet: Equipment and Beyond David Bankowski IT Manager, Electronic Communications 25 July 2008 Insert graphic.
WiFi Hotspots Internet Wireless Connection for Delegates at the UN
WLAN Validation 1 Motorola Public Document Classification, October 2011 MODULE 18 WLAN VALIDATION.
Broadband Wireless Applications for the Mining Industry.
Mobile Broadband for E&R Users Victor Reijs, Nick Murray TERENA-GA, Oct. 22 nd, 2009, Bucharest, Romania.
Fortune >80% deploying mobile clients Smartphones 289M in 2010 >900M in Slates 55M in 2011 >200M in Gartner Forecast: Mobile.
Rider Universitys BYOD Story. First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Mobile Device Protocol Sunil Vallamkonda 11/19/2012.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Service Provider WiFi Addressing the Mobile Data Challenge
University of Calgary AirUC Comtech Report December 13, 2005.
IPWireless Overview Thierry Maupile Fastnet Futures April 2, 2003.
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
A GENERIC OFFICE WITHOUT THE WISENET SYSTEM A GENERIC OFFICE WITH THE WISENET SYSTEM.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
All Rights Reserved © Alcatel-Lucent | Enterprise mobility | 2010 Laurent Bouchoucha October, 2010 Seamless mobility in a secure and controlled.
Utility-grade Wi-Fi It is possible, it is a necessity…
Chapter 15 Radio Frequency Site Survey Fundamentals
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Build /16/2017 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Introductory deck to Avaya WLAN 9100 Series
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Welcome to BYOT PD Informational Training By: Mr. Kirkpatrick & Mr. Saintvilus.
1 © 2011 XIRRUS :: All Rights Reserved BRING YOUR OWN DEVICE (BYOD) DOESN’T HAVE TO MEAN UNCONTROLLED NOVEMBER 2011 Perry Correll Xirrus, Principal Technologist.
1 Chapter Overview Wireless Technologies Wireless Security.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
BUDGETING FOR SUSTAINABLE TECHNOLOGY TechCon – October 14, 2011.
February 23, Play Video BYOD can help students sharpen their 21st Century skills to work towards college and career readiness. Click.
Get your network ready for Apple Observations from Aruba Networks
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
A few notes. First - What is the Cloud ? * Any number of blogs / articles and definitions * Accessing information services and software over the internet.
The Complete Solution Wireless Services. Understanding your Wireless Requirements Infrastructure is Key Budget Coverage Capacity Management Security Integration.
1 Wireless Networks and Services 10 Years Down the Road Ross Murch Professor, Electronic and Computer Engineering Director, Centre for Wireless Information.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Aerohive ® NETWORKS What’s Next in Wi-Fi Data Connectors Detroit, 3/31/2016.
PNNL Site Update July, 2009 Lewis Allen, Network Engineer.
Moving to BYOD Gary Audin 1.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
Antony Edwin Keane Inc Ltd
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
Mobile Device Management
IT Management, Simplified
Presentation transcript:

Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!

Industry Trends

Bring Your Own Device (BYOD) and the Consumerization of IT Can we realize cost savings with not providing company owned and managed cell phones? Our staff now expects to be able to use their own devices to access: – , Calendar and Sharepoint –Demand for EMR –And other applications So, the question is: Will we as an organization support our end users or will we continue to tell them No, we do not support that.?

Salem Health Current Environment

Salem Health Current Security Policy Regarding Smart Phones and Tablets iPhones and iPads are allowed. –End user must sign hospital policy document. –Must be managed by MS Exchange server. –Local password/PIN on device is required. –Local encryption is required. Blackberries are supported through a Blackberry Enterprise Server (BES). –Salem Health is currently phasing out the practice of providing Blackberries (and all cell phones) to staff. Everything else is not allowed at this time.

Salem Health Current WiFi Environment Coverage, Capacity and Quality (CCQ) Limit number of broadcast SSIDs to minimize WiFi overhead Dense deployment = 60 average spacing between APs with APs deployed at the corners and edges of the floor. (Equates to 1 AP per 2200 to 2500 square feet depending on the shape of the building) Smartphones and tablet radios are typically 10% of an Access Points max power.

What is connected to Salem Health WiFi? ~1000 unique wireless guest users in a 24 hour period. Peak of about 400 during the day. ~700 Voice over WiFi phones. ~50 temperature sensors ~600 CIMs and laptops ~200 smart phones (blackberries and iPhones) ~900 Infusion Pumps ~20 EKG machines Plans WiFi Clocks, RFID tags and an additional 800 VoWiFi phones

Troubleshooting Tools What to do when the vendor blames the network? –Multi Channel Wireless Packet Sniffer –Spectrum Analyzer –Site Survey Tools –VoWiFi Analysis Tools

Salem Health Where we need to be for Information Services to support BYOD

Network Profiling, Network Access Control and Mobile Device Management Accurate Network Device Profiling is Critical! –Identify what and who is connected where Posture Assessment –Patched? Antivirus? User/Role Based Access Control: –Grant Access to permitted resources, restrict access to everything else. Smart Phone and Tablet Management (MDM) –Auto Enrollment for End users –Push WiFi and VPN security settings, Apps –Control password policy and local encryption

Salem Health Lessons Learned

Not all devices are not the same –Many medical devices advertise g but only communicate at 1mbps or 2mbps. This will degrade performance for the rest of the devices within range. –Client devices control the roaming behavior –When choosing a VoWiFi vendor, choose a vendor with experience and fully test in your environment prior to rolling out. Do not choose a 1 st generation VoWiFi handset. Ask for references and speak with them regarding their experiences.