Integrated NAC, MDM and BYOD monitoring SM beyond : (secured and monitored BYOD environment)
The idea of introducing bring your own device to organizations (BYOD) is to allow employees of bringing and using their own computing device such as smartphones and tables to use enterprise applications and access data. The introduction of BYOD practice has been widely supported because it save cost...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2016
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/6640 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Summary: | The idea of introducing bring your own device to organizations (BYOD) is to allow employees of bringing and using their own computing device such as smartphones and tables to use enterprise applications and access data. The introduction of BYOD practice has been widely supported because it save costs, increase productivity and satisfies employees. However, it has brought a significant change in the field of securing and managing the organization's networks. Companies have to be wary of the threats such as security issues malwares, and bandwidth issues brought by the introduction of BYOD. Additionally, majority of the organizations do not enforce security policies. The study's proposed solution is an integrated NAC, MDM, BYOD monitoring, and automated response system that will greatly improve the security of the BYOD environment. NAC, MDM, and the response system provide an active way to secure the network while mobile monitoring provides a passive way of securing the network by monitoring, and logging all connected devices. With NAC present in the network, it is possible to authenticate users upon connecting to the network. After authenticating the users, MDM enforces security policies in order to secure the devices and the network together. With the availability of a secured NAC and MDM network, monitoring with automatic responses to violators is the next solution in order to see if the policies pushed by the MDM are enforced. Monitoring acts as another layer of security to the organization, as it tracks the enforcement of the MDM. While the response system provides a way to punish users who are deemed suspicious because of their violations towards the policies of the company. This study uses De La Salle University Manila as its test case for an enterprise system. It will adapt De La Salle University Manila's policies as guidelines for the implementation of policies whose goals are to secure and monitor the BYOD environment. |
---|