Network Guest Access Management

Managing the Bring Your Own Device (BYOD) Revolution

The challenges in managing network access are being amplified by the new generation of personal smart devices including iPhones, tablets and other personal devices that employees and guests want to connect to the work wireless network. The BYOD phenomenon is seeing a flood of diverse Wi-Fi® devices entering networks claiming their share of WLAN resources. Networks must be prepared to deliver secure, scalable wireless network access to a diversity of devices and users.

Wireless networks should be capable of enabling one-click self provisioning of client devices for secure 802.1x connectivity.

Guest Access Management

Many network environments, such as public arenas, hotels, hospitals and corporations face the challenge of providing and managing access of a plethora of guest devices onto their network. Dealing with this includes deciding who will create user accounts for guests, the creation of guest accounts based on established security policies and controlling the limits of what guest sponsors can do.

Guest access solutions enable anyone within an organisation to become a sponsor and create an account for a guest in real time, with no need to locate a specific individual to perform this task.

Recommended Solutions:

 

 

Network Access Control

Network Access Control (NAC) aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do.

As networks have evolved over the years, so too have the threats to network security. With each new type of threat came increased awareness of the need for new security solutions.

As a result, today’s network security landscape consists of a number of disparate security “silos”, with each addressing a portion of an organization’s overall security needs:

  • Endpoint Security software including anti-virus, anti-spyware, etc.
  • Network infrastructure security features built in to switches, routers, wireless controllers, etc.
  • Security “appliances” including IDS/IPS, firewall, data loss prevention (DLP), network behavior analysis (NBA), etc.

Most NAC solutions entail authentication (identity), endpoint compliance, remediation, and policy enforcement functions in the process of validating user identity and the security posture of host devices before allowing access to the network.

Recommended Solutions: