Presentation is loading. Please wait.

Presentation is loading. Please wait.

BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.

Similar presentations


Presentation on theme: "BYOD Guide Created using iThoughts [...] [...]. BYOD Guide."— Presentation transcript:

1 BYOD Guide Created using iThoughts [...] [...]

2 BYOD Guide

3 Introduction Who is this for? Implications of BYOD Implications of no BYOD What is your policy? – Authentication – End Point Security – Access Control

4 Discovery Type/Class of Device – Class of Device IT Managed User Managed – Type of Device Laptop Tablet Smart Phone Other

5 Discovery Type/Class of User – Known Super User Departmental User Contractor – Unknown Contractor Guest

6 Discovery Location – Office – Home – Public Wi-Fi Hote Spot – Hotel – Non-corporate Office Time of Day/Day of Week

7 Discovery Bandwidth Allocation – Per Device – Per User – Per Application Application/Service

8 Telephony Support Type/Class of Device Features – Single Number – Presence – Mobility

9 Define Access Policies Security Policy Alignment Network Services – Known User HR Involvement – New Employee Policy – Leavers Policy IT Managed Device – Laptop – Tablet

10 Define Access Policies User Managed Device – Corporate Location – Home – Other Location – Unknown User User Managed Device – Corporate Location Telephony – Corporate Handset

11 Define Access Policies Staff Contractor – Personal Handset Staff Contractor – HR Involvement New Employee Policy Leavers Policy

12 Design, Specification & Deployment Goals - what do you want to achieve? Design & Architecture Resilience/Redundancy Integration Define User Groups Profile - what can we find out about the device? Posture - what are we checking?

13 Design, Specification & Deployment Enforcement - what action do we take? Implementation - how do we install? Setting Expectations Determine Timescales Scheduling User Group Regression Plans Proof of Concept

14 Design, Specification & Deployment – Users – User Devices – Objectives – Pre-test – Success Criteria – Stakeholders – Sign Off

15 Management On Boarding – IT Staff Impact – Automation Monitoring – Diagnostics – Logging – Compliance and Auditing

16 Management – Reporting – Alarms – Incident Response – Revocation Security Policy Aligment – Users – IT Managed Device

17 Management – User Managed Device – HR Implications – Change Management – Security Audit – Review Process

18 Next Steps Call Marie on +44 (0) Marie -


Download ppt "BYOD Guide Created using iThoughts [...] [...]. BYOD Guide."

Similar presentations


Ads by Google