Presentation Title Goes Here: Up to Two Lines

Download Report

Transcript Presentation Title Goes Here: Up to Two Lines

Secure Bring Your Own Device (BYOD)
for Higher Education
Name
Title
Email
The Top Trends
Consumerization
of IT
Virtualization
Collaboration and
the cloud
Implication:
Implication:
Implication:
The network will
have to manage the
very devices that are
brought onto campus
and access your
applications
All applications will
be in the data
center…
Your application
performance will be
more dependent
upon the network,
than the application
© 2012 Avaya Inc. All rights reserved.
And VDI
2
Shift towards Mobile Computing
Feb. 14, 2011, Tablet Demand and Disruption
© 2012 Avaya Inc. All rights reserved.
3
Realities of Smart Devices, Like It Or Not…
 A new smartphone comes out on Thursday
 Bill, the faculty dean will buy one on Friday
 He’ll ask how to use it on campus network on Friday
 You still have to come to work on Monday
 72% of organizations are permitting the use of employeeowned devices—Aberdeen
 77% of smartphones used at work are chosen by an
employee
 48% are chosen without regard for IT support
© 2012 Avaya Inc. All rights reserved.
4
BYOD – Bring Your Own Device
means using privately owned wireless
and/or portable electronic piece of
equipment that includes laptops,
netbooks, iPods, tablets, iPod Touches,
cell and smart phones to support
academics and work.
© 2012 Avaya Inc. All rights reserved.
5
Student Technology Ownership in Higher Ed
What are students bringing onto campuses?
Source: Educause Center for Applied Research (ECAR) National study of students and information technology in
higher education, Oct. 2011, http://www.educause.edu/2011StudentStudy
© 2012 Avaya Inc. All rights reserved.
6
Student Technology Ownership in Higher Ed
Students recognize major academic benefits of technology
Source: ECAR National study of students and information technology in higher education, Oct. 2011,
http://www.educause.edu/2011StudentStudy
© 2012 Avaya Inc. All rights reserved.
7
The influx of consumer-owned
devices into the education
environment cannot be
stopped
How can we best incorporate
student- and staff-owned
devices into the curriculum
and work
“Bring your own device (BYOD) will become the prevalent practice in
educational settings at all levels within the next five years.”
Source: Gartner - BYOD in Education by Design, Not Default 3 May 2012, G00233448
© 2012 Avaya Inc. All rights reserved.
8
What are your
top concerns
and challenges
of BYOD?
© 2012 Avaya Inc. All rights reserved.
9
BYOD
The BYOD
Challenge in
Education
© 2012 Avaya Inc. All rights reserved.
10
Readiness Challenges to BYOD
“Have you considered the implications of
BYOD on your network?”
1. Do you have business partners and guest who are
frustrated by their inability to get the information
they need when they need it?
2. Only 9% of organizations are fully aware of the
devices accessing their network… are you?
3. Do you worry it’s simply a matter of time before a
security or compliance breach occurs due to the
use of personal devices?
4. Analysts predict 80% of newly installed WLANs will
be obsolete by 2015 due to BYOD. Are you
concerned?
5. Is your wireless network ready to support video?
© 2012 Avaya Inc. All rights reserved.
11
What if…
 Partners and guests were given the right
level of access to the appropriate resources
in seconds
 You could onboard personal devices to
campus networks in minutes
 You could fingerprint user devices to have
complete visibility, security and control
over the network
 You could deploy a video-ready wireless
network capable of handling the massive
growth
© 2012 Avaya Inc. All rights reserved.
12
A step-by-step process to enable BYOD
1. Open the door with
Guest Access
2. Expand into
Access Control
3. Introduce Wireless
considerations
© 2012 Avaya Inc. All rights reserved.
Support access for visitors, business
partners & contractors
Allows students, faculty and staff to
use their personal devices for
academic and work
Provides a “BYOD ready” campus
wireless network
13
1. Open the door with
Guest Access
Over 90% of organizations do
not offer Guest Access today
because…
“I don’t want to expose my network
infrastructure to security breaches”
“It’s too costly… I’d need to build a
parallel separate infrastructure”
“Provisioning is manual & painful. I need
the MAC address of devices, I need to
modify the data base for access control,
etc….”
© 2012 Avaya Inc. All rights reserved.
14
1. Open the door with
Guest Access
What’s required: A Secure and Simpler way to
address Guest Access…..
Identity and Network Access Control
with Guest Management
Should:
 Provision guests in seconds
 Offer a self provisioning kiosk
 Provide detailed tracking and auditing
Authenticated Network Access
© 2012 Avaya Inc. All rights reserved.
15
Authenticated Network Access
Identity and Network Access
Control
Corporate
Directories
Institution’s
Enterprise
WLAN
© 2012 Avaya Inc. All rights reserved.
Identity
Engines
Institution’s
Enterprise
LAN
Internet and
VPN
16
2. Expand into Access
Control
BYOD challenges….
IT Compliance
Security
To enforce ‘who get’s on, to
do what, to go where’
To prevent unauthorized
access and allow access
who needs it
Track where and what they
access
Network Capacity
Quality of Service
To accommodate growth and
collaborative applications
© 2012 Avaya Inc. All rights reserved.
To ensure business critical
applications get priority
17
2. Expand into Access
Control
Identity and
Network Access
Control
Case 1
Employee with
corporate laptop
Secure and Enforce IT Compliance
HR employee example
IF
(identity = HR employee)
AND IF
(device = corp laptop)
AND IF
(medium = wired)
THEN
ALLOW & GRANT
FULL ACCESS
IF
(identity = HR employee)
Case 2
Employee with
personal iPad
(same corporate
credentials)
© 2012 Avaya Inc. All rights reserved.
AND IF
(device = personal iPad)
AND IF
(medium = wireless)
THEN
ALLOW & GRANT
LIMITED ACCESS
18
3. Introduce Wireless
considerations
Enterprises deploying iPads
will need 300% more Wi-Fi
• 70% of new enterprise users by 2013
will be wireless by default and wired by
exception
• Video soft clients growing at 340%
through 2015
• In the past WLANs were deployed for
convenience; they were not designed
for pervasive Wi-Fi services, real time
communication and high throughput
© 2012 Avaya Inc. All rights reserved.
19
Evaluating Network Solutions
 Network Architecture
 Ethernet routing and
switching
 Wireless LAN
 Security
 Identity management
 Network management
 Remote access
© 2012 Avaya Inc. All rights reserved.
20
Avaya Wireless LAN 8100 Series
Combines 802.11n standard with an unified wireless/wired
architecture for schools
 Greater wireless
capacity, performance,
and coverage through
802.11n
 Reduce costs by offering
a simplified network
infrastructure
 Optimized for real-time
applications such as
voice, unified
communications and
video
© 2012 Avaya Inc. All rights reserved.
31%
23%
31% More video
call sessions
than competitive
average
23% More
VoWLAN call
sessions than
competitive
average
Source: Miercom 2011 Avaya Test Reports
21
Avaya Ethernet Routing Switches
Get you campus wired network ready
for BYOD and mobile learning
Range of core and access switches
for entry-level locations through highperformance Wiring Closet, to
Campus Core and Data Center
applications
36%
36% Less
edge energy
consumption
40%
40% Lower
edge total cost
of ownership
233%
233% Greater
stackable traffic
capacity
Source: Miercom 2011 Avaya Test Reports
© 2012 Avaya Inc. All rights reserved.
<1 sec.
Certified
sub-second
failover
7x
25x
Up to 7x faster Up to 25x faster
time to service
time to service
for virtual
for virtual
network
network
provisioning than provisioning than
Switch
Spanning Tree
Clustering
22
Avaya Identity Engines
Provides central policy decision needed to enforce role-based
network access control
 Unified wired and
wireless
 Vendor agnostic
 Virtual appliance
 Robust guest
management
 Granular policy engine
 Sophisticated directory
federation
 Simple affordable
licensing
3rd Generation Network Access
and Control Solution
www.avaya.com/usa/product/identity-engines-portfolio
© 2012 Avaya Inc. All rights reserved.
23
Summary
1. Open the door with
Guest Access
Support access for visitors, business
partners & contractors
2. Expand into
Access Control
Allows students, faculty and staff to
use their personal devices for
academic and work
3. Introduce Wireless
considerations
Provides a “BYOD ready” campus
wireless network
© 2012 Avaya Inc. All rights reserved.
24
Mobile Learning/BYOD Whitepaper
 New whitepaper from the
Center for Digital Education
 “Mobile Learning:
Preparing for BYOD”
 Get your free copy at:
https://avaya.reg4events.com/events/bin/in
dex.cgi?op=dR&eventid=421635&cid=&cm
p=&em=
© 2012 Avaya Inc. All rights reserved.
25
To Learn More
Visit:
www.avaya.com/education
www.avaya.com/networking
or
Speak with an Avaya representative toll free:
1-855-227-4919
© 2012 Avaya Inc. All rights reserved.
26