Tag Archives: BYOD

Not very quiet on the Western Front..Blogging on NAC

It may appear that I’ve been a quiet on the blogging side for a bit but I’ve been working quietly away producing a total of four new blogs for Juniper J-Net.  The first is already up, the other will be up in the next couple of weeks.

Deploying Network Access Control by Stealth

The first are a trilogy (another one!) on taking a tactical approach to deploying network access control in the Enterprise. I’ve seen this done wrong plenty of times and projects either flame out before they get anywhere near the purchase stage or worse, end up with going very Pete-Tong at the implementation and send a significant part of the network into Cardiac arrest. It’s not the “fault” of the technology at all; it’s a complex beast and interacts with the network in a hundreds of tiny ways. Most networks of any size rumble along with a variety of nasties lurking in the undergrowth; incorrect duplex, poorly conceived network routing, hideously out of date firmware, no reverse DNS etc. Apply NAC to a network which doesn’t have all these things dove tailed perfectly and you’re headed for a career limiting FAIL. 

The blog also further skirts around issues of control around BYOD. It’s still not an idea I’m completely in Love with, but there are some evils I’m learning to live with.  Applying NAC techniques and technologies to support BYOD is a significant step forward in doing BYOD “right”. I suppose my biggest issue is that there really isn’t much in the way of “best practice” yet; the technology on the enpoint is moving very fast indeed.  Developing up to date client agents of major platforms Android, iOS, Windows Mobile and Symbian is a major PITA as the release platform release cycle is so fast.  Not every vendor is opening up there API completely, not every platform has a guaranteed lifespan and some vendors have a torturously opaque application submission process (no prizes for guessing that one). 

I am going to blog more about BYOD when I get a chance, but please take a look when you’ve a moment!

 

Advertisement

Why “BYOD” Policies are keeping me awake at night

 

In June 2010 a customer was starting to mull the idea of a “Bring your own Device” (BYOD) policy. There are various interpretations of this but it’s been certainly been driven by the huge growth in smartphones and tablets in the enterprise.  A story familiar to you all: CxO of your company is a “technical” and brings into the office Foxconn’s finest fondleware.  Suddenly it’s your number one priority to “increase the productivity” of this shiny-haired buffoon by allowing him to strut around the place with a rare-earth vanity mirror Facebooking his Mum or what-not.  I’m going to focus on the whole practicalities of access and network access control in a future blog, but as you may suspect, I’ve got a bit of an issue with these policies and what it means to the enterprise and the poor sap whose job it is too keep the data where it’s supposed to be and looked at by whom it’s supposed to be.

Continue reading