secure bring your own device (byod) for higher education name title email
TRANSCRIPT
Secure Bring Your Own Device (BYOD)for Higher Education
NameTitleEmail
© 2012 Avaya Inc. All rights reserved. 2
The Top Trends
Consumerization of IT
Implication:
The network will have to manage the very devices that are brought
onto campus and access your applications
Collaboration and the cloud
Implication:
Your application performance will be
more dependent upon the network,
than the application
Virtualization
Implication:
All applications will be in the data
center…
And VDI
© 2012 Avaya Inc. All rights reserved. 33
Shift towards Mobile Computing
Feb. 14, 2011, Tablet Demand and Disruption
© 2012 Avaya Inc. All rights reserved. 4
Realities of Smart Devices, Like It Or Not…
A new smartphone comes out on Thursday
Bill, the faculty dean will buy one on Friday
He’ll ask how to use it on campus network on Friday
You still have to come to work on Monday
72% of organizations are permitting the use of employee-owned devices—Aberdeen
77% of smartphones used at work are chosen by an employee
48% are chosen without regard for IT support
© 2012 Avaya Inc. All rights reserved. 5
BYOD – Bring Your Own Device means using privately owned wireless and/or portable electronic piece of equipment that includes laptops, netbooks, iPods, tablets, iPod Touches, cell and smart phones to support academics and work.
© 2012 Avaya Inc. All rights reserved. 66
Student Technology Ownership in Higher Ed
Source: Educause Center for Applied Research (ECAR) National study of students and information technology in higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy
What are students bringing onto campuses?
© 2012 Avaya Inc. All rights reserved. 77
Student Technology Ownership in Higher Ed
Source: ECAR National study of students and information technology in higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy
Students recognize major academic benefits of technology
© 2012 Avaya Inc. All rights reserved. 88
The influx of consumer-owned devices into the education
environment cannot be stopped
How can we best incorporate student- and staff-owned
devices into the curriculum and work
Source: Gartner - BYOD in Education by Design, Not Default 3 May 2012, G00233448
“Bring your own device (BYOD) will become the prevalent practice in educational settings at all levels within the next five years.”
© 2012 Avaya Inc. All rights reserved. 99
What are your top concerns
and challenges of BYOD?
© 2012 Avaya Inc. All rights reserved. 1010
The BYOD Challenge in
Education
BYOD
Overwhelmed networks!
Can’t connect!
Who’s on our network?
IT staff overloaded!
Always-on
4 devices per
student?
Security
Policy
© 2012 Avaya Inc. All rights reserved. 11
“Have you considered the implications of BYOD on your network?”
1. Do you have business partners and guest who are frustrated by their inability to get the information they need when they need it?
2. Only 9% of organizations are fully aware of the devices accessing their network… are you?
3. Do you worry it’s simply a matter of time before a security or compliance breach occurs due to the use of personal devices?
4. Analysts predict 80% of newly installed WLANs will be obsolete by 2015 due to BYOD. Are you concerned?
5. Is your wireless network ready to support video?
Readiness Challenges to BYOD
© 2012 Avaya Inc. All rights reserved. 12
What if…
Partners and guests were given the right level of access to the appropriate resources in seconds
You could onboard personal devices to campus networks in minutes
You could fingerprint user devices to have complete visibility, security and control over the network
You could deploy a video-ready wireless network capable of handling the massive growth
© 2012 Avaya Inc. All rights reserved. 13
Support access for visitors, business partners & contractors
Allows students, faculty and staff to use their personal devices for academic and work
Provides a “BYOD ready” campus wireless network
A step-by-step process to enable BYOD
1. Open the door with Guest Access
2. Expand into Access Control
3. Introduce Wireless considerations
© 2012 Avaya Inc. All rights reserved. 14
Over 90% of organizations do not offer Guest Access today
because…
“I don’t want to expose my network infrastructure to security breaches”
“It’s too costly… I’d need to build a parallel separate infrastructure”
“Provisioning is manual & painful. I need the MAC address of devices, I need to
modify the data base for access control, etc….”
1. Open the door with Guest Access
© 2012 Avaya Inc. All rights reserved. 15
Identity and Network Access Control with Guest Management
Should: Provision guests in seconds
Offer a self provisioning kiosk
Provide detailed tracking and auditing
What’s required: A Secure and Simpler way to address Guest Access…..
1. Open the door with Guest Access
Authenticated Network Access
© 2012 Avaya Inc. All rights reserved. 1616
Identity Engines
Corporate Directories
Institution’s Enterprise
WLAN
Institution’s Enterprise
LAN
Internet and VPN
Identity and NetworkAccess Control
Unified wired and wireless access
BYOD and Guest access management
Identity and Network Access Control
Authenticated Network Access
© 2012 Avaya Inc. All rights reserved. 1717
BYOD challenges….
Network CapacityTo accommodate growth and
collaborative applications
IT ComplianceTo enforce ‘who get’s on, to
do what, to go where’
SecurityTo prevent unauthorized access and allow access
who needs it
Track where and what they access
Quality of ServiceTo ensure business critical applications get priority
2. Expand into Access Control
© 2012 Avaya Inc. All rights reserved. 18
Secure and Enforce IT ComplianceHR employee example
IF(identity = HR employee)
AND IF(device = personal iPad)
AND IF(medium = wireless)
THENALLOW & GRANTLIMITED ACCESS
Case 2Employee with personal iPad
(same corporate credentials)
IF(identity = HR employee)
AND IF(device = corp laptop)
AND IF(medium = wired)
THENALLOW & GRANT
FULL ACCESS
Case 1Employee with corporate laptop
Identity and Network Access Control
2. Expand into Access Control
© 2012 Avaya Inc. All rights reserved. 19
Enterprises deploying iPads will need 300% more Wi-Fi
• 70% of new enterprise users by 2013 will be wireless by default and wired by exception
• Video soft clients growing at 340% through 2015
• In the past WLANs were deployed for convenience; they were not designed for pervasive Wi-Fi services, real time communication and high throughput
3. Introduce Wireless considerations
© 2012 Avaya Inc. All rights reserved. 2020
Evaluating Network Solutions
Network Architecture
Ethernet routing and switching
Wireless LAN
Security
Identity management
Network management
Remote access
© 2012 Avaya Inc. All rights reserved. 2121
Avaya Wireless LAN 8100 Series
Greater wireless capacity, performance, and coverage through 802.11n
Reduce costs by offering a simplified network infrastructure
Optimized for real-time applications such as voice, unified communications and video
Combines 802.11n standard with an unified wireless/wired architecture for schools
31% More video call sessions
than competitive average
23% More VoWLAN call sessions than competitive
average
23%31%
Source: Miercom 2011 Avaya Test Reports
© 2012 Avaya Inc. All rights reserved. 2222
Avaya Ethernet Routing Switches
Range of core and access switches for entry-level locations through high-performance Wiring Closet, to Campus Core and Data Center applications
36% Less edge energy consumption
40% Lower edge total cost of ownership
233% Greater stackable traffic
capacity
40%36% 233%
Certified sub-second
failover
<1 sec.
Up to 7x faster time to service
for virtual network
provisioning than Switch
Clustering
Up to 25x faster time to service
for virtual network
provisioning than Spanning Tree
7x 25x
Source: Miercom 2011 Avaya Test Reports
Get you campus wired network ready for BYOD and mobile learning
© 2012 Avaya Inc. All rights reserved. 23
Avaya Identity Engines
Unified wired and wireless
Vendor agnostic Virtual appliance Robust guest
management Granular policy engine Sophisticated directory
federation Simple affordable
licensing
Provides central policy decision needed to enforce role-based network access control
www.avaya.com/usa/product/identity-engines-portfolio
3rd Generation Network Access and Control Solution
© 2012 Avaya Inc. All rights reserved. 24
Summary
1. Open the door with Guest Access
2. Expand into Access Control
3. Introduce Wireless considerations
Support access for visitors, business partners & contractors
Allows students, faculty and staff to use their personal devices for academic and work
Provides a “BYOD ready” campus wireless network
© 2012 Avaya Inc. All rights reserved. 2525
Mobile Learning/BYOD Whitepaper
New whitepaper from the Center for Digital Education
“Mobile Learning: Preparing for BYOD”
Get your free copy at:
https://avaya.reg4events.com/events/bin/index.cgi?op=dR&eventid=421635&cid=&cmp=&em=
© 2012 Avaya Inc. All rights reserved. 2626
To Learn More
Visit:www.avaya.com/education www.avaya.com/networking
or
Speak with an Avaya representative toll free: 1-855-227-4919