Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure Bring Your Own Device (BYOD) for Higher Education Name Title Email.

Similar presentations


Presentation on theme: "Secure Bring Your Own Device (BYOD) for Higher Education Name Title Email."— Presentation transcript:

1 Secure Bring Your Own Device (BYOD) for Higher Education Name Title Email

2 © 2012 Avaya Inc. All rights reserved. 2 The Top Trends Consumerization of IT Implication: The network will have to manage the very devices that are brought onto campus and access your applications Collaboration and the cloud Implication: Your application performance will be more dependent upon the network, than the application Virtualization Implication: All applications will be in the data center… And VDI

3 © 2012 Avaya Inc. All rights reserved. 33 Shift towards Mobile Computing Feb. 14, 2011, Tablet Demand and Disruption

4 © 2012 Avaya Inc. All rights reserved. 4 Realities of Smart Devices, Like It Or Not…  A new smartphone comes out on Thursday  Bill, the faculty dean will buy one on Friday  He’ll ask how to use it on campus network on Friday  You still have to come to work on Monday  72% of organizations are permitting the use of employee- owned devices—Aberdeen  77% of smartphones used at work are chosen by an employee  48% are chosen without regard for IT support

5 © 2012 Avaya Inc. All rights reserved. 5 BYOD – Bring Your Own Device means using privately owned wireless and/or portable electronic piece of equipment that includes laptops, netbooks, iPods, tablets, iPod Touches, cell and smart phones to support academics and work.

6 © 2012 Avaya Inc. All rights reserved. 66 Student Technology Ownership in Higher Ed Source: Educause Center for Applied Research (ECAR) National study of students and information technology in higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy What are students bringing onto campuses?

7 © 2012 Avaya Inc. All rights reserved. 77 Student Technology Ownership in Higher Ed Source: ECAR National study of students and information technology in higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy Students recognize major academic benefits of technology

8 © 2012 Avaya Inc. All rights reserved. 88 The influx of consumer-owned devices into the education environment cannot be stopped How can we best incorporate student- and staff-owned devices into the curriculum and work Source: Gartner - BYOD in Education by Design, Not Default 3 May 2012, G00233448 “Bring your own device (BYOD) will become the prevalent practice in educational settings at all levels within the next five years.”

9 © 2012 Avaya Inc. All rights reserved. 99 What are your top concerns and challenges of BYOD?

10 © 2012 Avaya Inc. All rights reserved. 10 The BYOD Challenge in Education BYOD Overwhelmed networks! Can’t connect! Who’s on our network? IT staff overloaded! Always-on 4 devices per student? Security Policy

11 © 2012 Avaya Inc. All rights reserved. 11 “Have you considered the implications of BYOD on your network?” 1.Do you have business partners and guest who are frustrated by their inability to get the information they need when they need it? 2.Only 9% of organizations are fully aware of the devices accessing their network… are you? 3.Do you worry it’s simply a matter of time before a security or compliance breach occurs due to the use of personal devices? 4.Analysts predict 80% of newly installed WLANs will be obsolete by 2015 due to BYOD. Are you concerned? 5.Is your wireless network ready to support video? Readiness Challenges to BYOD

12 © 2012 Avaya Inc. All rights reserved. 12 What if…  Partners and guests were given the right level of access to the appropriate resources in seconds  You could onboard personal devices to campus networks in minutes  You could fingerprint user devices to have complete visibility, security and control over the network  You could deploy a video-ready wireless network capable of handling the massive growth

13 © 2012 Avaya Inc. All rights reserved. 13 Support access for visitors, business partners & contractors Allows students, faculty and staff to use their personal devices for academic and work Provides a “BYOD ready” campus wireless network A step-by-step process to enable BYOD 1.Open the door with Guest Access 2.Expand into Access Control 3.Introduce Wireless considerations

14 © 2012 Avaya Inc. All rights reserved. 14 Over 90% of organizations do not offer Guest Access today because… “I don’t want to expose my network infrastructure to security breaches” “It’s too costly… I’d need to build a parallel separate infrastructure” “Provisioning is manual & painful. I need the MAC address of devices, I need to modify the data base for access control, etc….” 1.Open the door with Guest Access

15 © 2012 Avaya Inc. All rights reserved. 15 Identity and Network Access Control with Guest Management Should:  Provision guests in seconds  Offer a self provisioning kiosk  Provide detailed tracking and auditing What’s required: A Secure and Simpler way to address Guest Access….. 1.Open the door with Guest Access Authenticated Network Access

16 © 2012 Avaya Inc. All rights reserved. 16 Identity Engines Corporate Directories Institution’s Enterprise WLAN Institution’s Enterprise LAN Internet and VPN Identity and Network Access Control Authenticated Network Access

17 © 2012 Avaya Inc. All rights reserved. 17 BYOD challenges…. Network Capacity To accommodate growth and collaborative applications IT Compliance To enforce ‘who get’s on, to do what, to go where’ Security To prevent unauthorized access and allow access who needs it Track where and what they access Quality of Service To ensure business critical applications get priority 2.Expand into Access Control

18 © 2012 Avaya Inc. All rights reserved. 18 Secure and Enforce IT Compliance HR employee example IF (identity = HR employee) AND IF (device = personal iPad) AND IF (medium = wireless) THEN ALLOW & GRANT LIMITED ACCESS Case 2 Employee with personal iPad (same corporate credentials) IF (identity = HR employee) AND IF (device = corp laptop) AND IF (medium = wired) THEN ALLOW & GRANT FULL ACCESS Case 1 Employee with corporate laptop Identity and Network Access Control 2.Expand into Access Control

19 © 2012 Avaya Inc. All rights reserved. 19 Enterprises deploying iPads will need 300% more Wi-Fi 70% of new enterprise users by 2013 will be wireless by default and wired by exception Video soft clients growing at 340% through 2015 In the past WLANs were deployed for convenience; they were not designed for pervasive Wi-Fi services, real time communication and high throughput 3.Introduce Wireless considerations

20 © 2012 Avaya Inc. All rights reserved. 20 Evaluating Network Solutions  Network Architecture  Ethernet routing and switching  Wireless LAN  Security  Identity management  Network management  Remote access

21 © 2012 Avaya Inc. All rights reserved. 21 Avaya Wireless LAN 8100 Series  Greater wireless capacity, performance, and coverage through 802.11n  Reduce costs by offering a simplified network infrastructure  Optimized for real-time applications such as voice, unified communications and video Combines 802.11n standard with an unified wireless/wired architecture for schools 31% More video call sessions than competitive average 23% More VoWLAN call sessions than competitive average 23 % 31 % Source: Miercom 2011 Avaya Test Reports

22 © 2012 Avaya Inc. All rights reserved. 22 Avaya Ethernet Routing Switches Range of core and access switches for entry-level locations through high- performance Wiring Closet, to Campus Core and Data Center applications 36% Less edge energy consumption 40% Lower edge total cost of ownership 233% Greater stackable traffic capacity 40%36%233% Certified sub-second failover <1 sec. Up to 7x faster time to service for virtual network provisioning than Switch Clustering Up to 25x faster time to service for virtual network provisioning than Spanning Tree 7x25x Source: Miercom 2011 Avaya Test Reports Get you campus wired network ready for BYOD and mobile learning

23 © 2012 Avaya Inc. All rights reserved. 23 Avaya Identity Engines  Unified wired and wireless  Vendor agnostic  Virtual appliance  Robust guest management  Granular policy engine  Sophisticated directory federation  Simple affordable licensing Provides central policy decision needed to enforce role-based network access control www.avaya.com/usa/product/identity-engines-portfolio 3 rd Generation Network Access and Control Solution

24 © 2012 Avaya Inc. All rights reserved. 24 Summary 1.Open the door with Guest Access 2.Expand into Access Control 3.Introduce Wireless considerations Support access for visitors, business partners & contractors Allows students, faculty and staff to use their personal devices for academic and work Provides a “BYOD ready” campus wireless network

25 © 2012 Avaya Inc. All rights reserved. 25 Mobile Learning/BYOD Whitepaper  New whitepaper from the Center for Digital Education  “Mobile Learning: Preparing for BYOD”  Get your free copy at:free copy https://avaya.reg4events.com/events/bin/in dex.cgi?op=dR&eventid=421635&cid=&cm p=&em=

26 © 2012 Avaya Inc. All rights reserved. 26 To Learn More Visit: www.avaya.com/education www.avaya.com/networking or Speak with an Avaya representative toll free: 1-855-227-4919

27


Download ppt "Secure Bring Your Own Device (BYOD) for Higher Education Name Title Email."

Similar presentations


Ads by Google