Intelligent CIO Middle East Issue 04 | Page 33

FEATURE: BYOD Basic: Ideal for organisations that want to offer basic network services and easy access to almost all users. The vast majority of the resources available on these networks are there to be accessed - not to be protected. The small amount of data that requires protection, such as grades and salary information, can be easily placed on a secure VLAN and protected from unauthorised mobile device access. Enhanced: This scenario is technically more advanced and requires more differentiated device and user access and a wide range of security policies. Healthcare establishments are good candidates for this category; consider an example where doctors would be able to securely access patient records with tablets while visitors would have guest access to the Internet only. Next-generation: Organisations under this category are creating environments that encourage mobile device use and generate benefits from that use. For example, a retail business could take advantage of a mobile device application to provide customers with a more enjoyable and informative shopping experience. Once an organisation decides which BYOD policy makes sense for them, they can build an infrastructure that supports it. As corporations begin to embrace an “any device, anywhere” strategy in 2016, IT administrators need to address personal mobile devices in the context of a threat landscape characterised by highly sophisticated and sometimes targeted attacks. They need to know who is on the network, the location of that individual, and whether they are accessing the appropriate resources. Obtaining and acting on this information will require multiple departments to collaborate in defining the processes and procedures that comprise an appropriate and successful mobile device strategy. Once business and s