BYOD Guide Created using iThoughts [...] [...]
BYOD Guide
Introduction Who is this for? Implications of BYOD Implications of no BYOD What is your policy? – Authentication – End Point Security – Access Control
Discovery Type/Class of Device – Class of Device IT Managed User Managed – Type of Device Laptop Tablet Smart Phone Other
Discovery Type/Class of User – Known Super User Departmental User Contractor – Unknown Contractor Guest
Discovery Location – Office – Home – Public Wi-Fi Hote Spot – Hotel – Non-corporate Office Time of Day/Day of Week
Discovery Bandwidth Allocation – Per Device – Per User – Per Application Application/Service
Telephony Support Type/Class of Device Features – Single Number – Presence – Mobility
Define Access Policies Security Policy Alignment Network Services – Known User HR Involvement – New Employee Policy – Leavers Policy IT Managed Device – Laptop – Tablet
Define Access Policies User Managed Device – Corporate Location – Home – Other Location – Unknown User User Managed Device – Corporate Location Telephony – Corporate Handset
Define Access Policies Staff Contractor – Personal Handset Staff Contractor – HR Involvement New Employee Policy Leavers Policy
Design, Specification & Deployment Goals - what do you want to achieve? Design & Architecture Resilience/Redundancy Integration Define User Groups Profile - what can we find out about the device? Posture - what are we checking?
Design, Specification & Deployment Enforcement - what action do we take? Implementation - how do we install? Setting Expectations Determine Timescales Scheduling User Group Regression Plans Proof of Concept
Design, Specification & Deployment – Users – User Devices – Objectives – Pre-test – Success Criteria – Stakeholders – Sign Off
Management On Boarding – IT Staff Impact – Automation Monitoring – Diagnostics – Logging – Compliance and Auditing
Management – Reporting – Alarms – Incident Response – Revocation Security Policy Aligment – Users – IT Managed Device
Management – User Managed Device – HR Implications – Change Management – Security Audit – Review Process
Next Steps Call Marie on +44 (0) Marie -