Intelligent CIO Middle East Issue 23 - Page 109

FINAL WORD Why BYOD doesn’t have to be your biggest headache Eight best practices to protect your enterprise network Smartphones and other personal devices can now be found in most businesses as users are staying connected to the corporate network from anywhere, any time. It’s the stuff that keeps IT and security managers up at night with mobile users, multiple devices per user and enterprise data on the move. Manish Bhardwaj, Senior Marketing Manager, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company, tells us how to best protect the network. S ecurity for Bring Your Own Device (BYOD) and mobile must now be part of a larger conversation when securing the network for the new digital workplace. Based on existing customers’ best practices, here are eight things you can do to boost network security amid BYOD. 1. Assign roles to users and devices With users carrying multiple devices, it’s smart to standardise on user roles across the organisation, and then assign device roles too. A smartphone issued by IT for a specific purpose may require more access privileges than a personal device. IT-issued laptops would have different roles than smartphones and tablets. The value is your ability to create different rules for each device type or role. User and device roles also let you differentiate privileges by device type for the same user. An IT administrator would be allowed to change switch and controller configurations with a laptop assigned a corporate role. But, that same person would not be able to access sensitive networking equipment using a tablet assigned a BYOD role. INTELLIGENTCIO 109