<img src="http://www.cloudtracer101.com/15158.png" style="display:none;">

Welcome to the Datrix Blog

Enterasys Networks First Vendor to Guarantee BYOD Solution Deployment

BYOD (Bring Your Own Device) to work is an undeniable trend affecting organizations of all sizes. Industry pundits anticipate 2 billion devices in use by 2015 with 75% of them used for both business and personal use. These devices and their apps have become foundational tools for today’s workforce and a major influence on the use and direction of UCC.

The upside is improved business agility and employee satisfaction coupled with reduced enterprise costs of acquiring and licensing the devices or apps. However, with so many new devices requiring access to networks, organizations need to be able to handle the influx in a safe, secure and positive quality of service (QoS)/user experience affecting manner.


This is driving network and security teams to assess new risks and implement new controls. Depending on the path taken to enable BYOD, significant redesign of existing workflows or the creation of new ones may be required. The most effective solutions encompass devices, types and identity, and add attributes associated with users, locations and applications.

Quite recently a number of vendors have announced BYOD solutions. This news analysis focuses specifically on the Enterasys (a Siemens Enterprise Communications Company) Mobile IAM (Identity and Access Manager) press release . Mobile IAM (slated for GA during June, 2012) is a component of the Enterasys OneFabric security architecture. Consistent with competitive offerings, this solution will be available in two form factors – physical and virtual. The virtual solution is a software appliance that can run on any VMware ESX partition.

Users sign into the solution, and Mobile AIM’s profiling engine creates a profile that includes everything from the device that’s being used and the applications running on it to the user’s location, authorization, the security software running on the device and network access types.

 

Topics: Network Analytics