Download presentation
Presentation is loading. Please wait.
Published byTalon Brierley Modified over 9 years ago
1
BYOD Guide Created using iThoughts [...] [...]
2
BYOD Guide
3
Introduction Who is this for? Implications of BYOD Implications of no BYOD What is your policy? – Authentication – End Point Security – Access Control
4
Discovery Type/Class of Device – Class of Device IT Managed User Managed – Type of Device Laptop Tablet Smart Phone Other
5
Discovery Type/Class of User – Known Super User Departmental User Contractor – Unknown Contractor Guest
6
Discovery Location – Office – Home – Public Wi-Fi Hote Spot – Hotel – Non-corporate Office Time of Day/Day of Week
7
Discovery Bandwidth Allocation – Per Device – Per User – Per Application Application/Service
8
Telephony Support Type/Class of Device Features – Single Number – Presence – Mobility
9
Define Access Policies Security Policy Alignment Network Services – Known User HR Involvement – New Employee Policy – Leavers Policy IT Managed Device – Laptop – Tablet
10
Define Access Policies User Managed Device – Corporate Location – Home – Other Location – Unknown User User Managed Device – Corporate Location Telephony – Corporate Handset
11
Define Access Policies Staff Contractor – Personal Handset Staff Contractor – HR Involvement New Employee Policy Leavers Policy
12
Design, Specification & Deployment Goals - what do you want to achieve? Design & Architecture Resilience/Redundancy Integration Define User Groups Profile - what can we find out about the device? Posture - what are we checking?
13
Design, Specification & Deployment Enforcement - what action do we take? Implementation - how do we install? Setting Expectations Determine Timescales Scheduling User Group Regression Plans Proof of Concept
14
Design, Specification & Deployment – Users – User Devices – Objectives – Pre-test – Success Criteria – Stakeholders – Sign Off
15
Management On Boarding – IT Staff Impact – Automation Monitoring – Diagnostics – Logging – Compliance and Auditing
16
Management – Reporting – Alarms – Incident Response – Revocation Security Policy Aligment – Users – IT Managed Device
17
Management – User Managed Device – HR Implications – Change Management – Security Audit – Review Process
18
Next Steps http://www.astro.co.uk/byod/byod-resource Call Marie on +44 (0)1322 610 178 Email Marie - mcronin@astro.co.uk
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.