Top Network Considerations for Enterprise Mobility and BYOD

Similar documents
Securing Today s Mobile Workforce

Preparing your network for the next wave of innovation

Make security part of your client systems refresh

A Guide to Closing All Potential VDI Security Gaps

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

The security challenge in a mobile world

Integrated Access Management Solutions. Access Televentures

2S00012W -Selling the Avaya IP Office Platform Overview. Selling the Avaya IP Office Platform Overview. October, S00012W

Cisco Start. IT solutions designed to propel your business

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Why Continuity Matters

Simplifying the Branch Network

Mastering The Endpoint

Why Enterprises Need to Optimize Their Data Centers

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Cisco VXI Smart Solution with VMware View

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

2018 Mobile Security Report

2015 VORMETRIC INSIDER THREAT REPORT

Connectivity to Cloud-First Applications

BYOD: Focus on User Experience, Not the Device

Trends in Next Generation Data Center Infrastructure. Summary Results January 2018

WHITEPAPER. How to secure your Post-perimeter world

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

White. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.

Top Priority for Hybrid IT

Microsoft 365 Business FAQs

State of SMB IT 1H 2012

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

IT Security: Managing a New Reality

ENTERPRISE MOBILITY TRENDS

DDoS MITIGATION BEST PRACTICES

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Spotlight Report. Information Security. Presented by. Group Partner

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Wireless Network Security Fundamentals and Technologies

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency

Mobilizing Your Workforce for Success

Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Survey Results: Virtual Insecurity

SD-WAN Solution How to Make the Best Choice for Your Business

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

Challenges and. Opportunities. MSPs are Facing in Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

A Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst

BUILDING the VIRtUAL enterprise

TREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think

Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

U.S. State of Cybercrime

Overcoming Business Challenges in WAN infrastructure

The future of UC&C on mobile

Welcome to the era of the anywhere worker

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

Securing Health Data in a BYOD World

As Enterprise Mobility Usage Escalates, So Does Security Risk

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Sales Presentation Case 2018 Dell EMC

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Mobility Optimized Access Layer

THALES DATA THREAT REPORT

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

WHITE PAPER. ENSURING SECURITY WITH OPEN APIs. Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs

Cisco Advanced Collaboration Architecture Sales Engineer.

Unified Communications. What are the Key Benefits of Replacing PBX with Cloud Based Solutions?

Taking Back Control of Your Network With SD-LAN

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Making the case for SD-WAN

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Using the Network to Optimize a Virtualized Data Center

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

CASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY THE CUSTOMER THE CHALLENGE

The Data Protection Rule and Hybrid Cloud Backup

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Toward an Automated Future

Mobility Advantage: Why Secure Your Mobile Devices?

Trend Report. Network Security: What IT Decision Makers Really Think

Maximum Security with Minimum Impact : Going Beyond Next Gen

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

The Value of Automated Penetration Testing White Paper

Why Converged Infrastructure?

Kaspersky Open Space Security

THE CUSTOMER SITUATION. The Customer Background

Combating Cyber Risk in the Supply Chain

2018 Edition. Security and Compliance for Office 365

BYOD Business year of decision!

Cisco Connected Factory Accelerator Bundles

Cisco Borderless Networks Value Proposition

The Cisco BYOD Smart Solution

Transcription:

Top Network Considerations for Enterprise Mobility and BYOD Survey pinpoints struggle to support BYOD and other worker-friendly technologies while achieving security & performance goals

1 Top Network Considerations for Enterprise Mobility and BYOD Contents Even as IT executives and network administrators seek to increase performance and shore up defenses against misuse and increasingly sophisticated intrusions, they are under pressure to make it easier for workers to utilize the corporate network with consumerized technologies. The inherent conflict between these forces is increasing concern over security issues and the cost of supporting the growing array of mobile devices. Network Implications 2 Holding the Line on Security 3 Policing Access 3 Juniper Networks Enterprise Mobility Solutions 4 In a recent survey conducted by Gatepoint Research on behalf of Juniper Networks, 44 percent of respondents indicate they are formally supporting Bring Your Own Device policies. BYOD, as it is commonly referred to, allows employees (and others such as contractors and partners) to bring personal devices such as smart phones and laptops and access the corporate network to view or use enterprise resources. Is there pressure to accommodate consumer technology in your IT environment? NO We don t have a lot of demand from employees to use their own devices SOMEWHAT We re seeing anincrease in employees using their own devices CONSIDERABLE PRESSURE. This is a growing trend that impacts our network CRITICAL The rise in employees use of consumer technology is incredible 10% 8% 3. 34% 44% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

Top Network Considerations for Enterprise Mobility and BYOD 2 Nine out of 10 of the survey respondents say they are feeling some degree of pressure to support BYOD, with 34 percent indicating it is considerable and 8 percent saying it is a critical issue with an incredible rise in employee use. BYOD is perhaps the epitome of the consumerization of IT movement and has expanded beyond devices to what some refer to as Bring Your Own Technology, including applications, devices and even cloud-based services. There are a number of network issues that come into play with the consumerization issue, says Tina Herrera, director of campus product marketing with Juniper. From a device perspective, network administrators want to know where has the device been and is it bringing viruses into my network. Is the device secure and will it protect the sensitive data? With BYOD, each type of mobile device is different and has unique vulnerabilities. Meanwhile enterprises must worry about increasingly numerous and sophisticated ways to attack each type of device. They must also defend against internal misuse of data to ensure those with legitimate access to data do not store it in an insecure manner or outright steal it. Nonetheless, in addition to those that formally support BYOD, another 35 percent report that their companies allow network access for BYOD although they don t formally support it. For many business leaders the benefits outweigh the risks: workers are equipped to be more responsive across time zones and geographies, while the enterprise saves on hardware costs. But somebody has to make sure that access to business-critical information is managed across an array of switching, security, routing and wireless products in a manner that meets the highest security requirements, achieves performance goals and doesn t create a management headache. Network Implications Today s multimedia and interactive applications present new ways of masking attacks, further increasing network vulnerability as well as soaking up bandwidth that can impact user experience for everyone on the network. When it comes to social media such as Facebook and Linked In, network decision makers appear be flying the white flag of surrender. While just 16 percent of the respondents in the Gatepoint survey formally support use of social media apps, almost two-thirds (62 percent) allow workers to access them; only 22 percent prohibit such use. That undoubtedly reflects pressure from users who have adopted these types of services as everyday tools, whether for work or pleasure or both. Allowing these new data types on enterprise networks creates additional pressure on administrators and architects to ensure that they are able to prioritize traffic. IT has to be able to monitor and control that activity so that network resources and services are being prioritized for legitimate business reasons, says Juniper s Herrera. Collaboration tools and video are very bandwidth intensive so enterprises need to know how to prioritize and segment the traffic so that the highest priority data and the highest priority users get the bandwidth they need to be successful. In addition to employee access, enterprise networks are expected to accommodate a rapidly growing number of partners, customers, patrons, vendors, and even casual visitors. More than ever they need identity management systems strong enough to ensure appropriate access but flexible enough not to get in the way. Because organizations must respond quickly to competitive and market changes and are often impacted by mergers and acquisitions, it s not unusual for organizations to end up with a patchwork of deployed technologies and management consoles. The result may be a hodge-podge of systems that don t talk to each other or leverage the benefits of a single place to provision, manage, and control the overall solution. Nonetheless, IT is expected to provide enhanced levels of performance that support wide and responsive distribution of today s sophisticated business and entertainment applications. That can range from simple order entry and account management, to resource intensive VoIP telephony and What s your company s policy with regards to giving access to the network via consumerized technology? BYOD (Bring Your Own Device) Voice over IP (i.e., Skype) Social media (i.e., Facebook, Linked In) Video/Audio (i.e., YouTube, Spotify) BYOA (Bring Your Own Apps) Formally Supported Not IT supported, but allowed Prohibited 44% 35% 20% 29% 35% 33% 16% 62% 21% 16% 60% 22% 7% 45% 45% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

3 Top Network Considerations for Enterprise Mobility and BYOD In the last year, did your network experience any of the following? Issues around guest access & device provisioning Issues around managing security policy end-to-end Bandwidth allocation issues (i.e., not enough bandwidth) Service outage over WLAN network Random low service quality (i.e., popping noise, choppiness) Service outage for sensitive voice & video calls interactive video training programs. Indeed, 64 percent of respondents in the Gatepoint survey either formally support or allow the use of VoIP, and even more 76 percent support or allow video and audio data from popular applications such as YouTube and Spotify. Holding the Line on Security At the same time as they strive to meet the demands of new media and data types, IT administrators and network architects must focus intently one how to protect business critical applications and intellectual property. They are also expected to further the cause of business agility by ensuring users have ready access to sophisticated online applications designed to fulfill their particular business needs. Compounding the network security challenge is the wider, more diverse audience (including employees, partners, subcontractors, and offshore facilities) that all require access to critical data. As a result, comprehensive and collaborative security for the network, applications, data, and user is essential. In the GateHouse survey, respondents say security on mobile devices that access the network is a critical top concern averaging 4.35 on a scale of 1-to-5. Allowing workers to access the network from their own personal Yes No Don t know 39% 35% 25% 35% 39% 23% 33% 47% 19% 31% 52% 17% 31% 45% 23% 29% 55% 16% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% devices introduces a host of security and connectivity challenges. The number one way hackers get into the network is from these mobile devices, says Herrera. People do all kinds things when they are away from work that can result in infections on their devices. Today s sophisticated attacks often fall between the cracks of traditional point security products. While decision makers are well aware of the tools available to help them maintain defenses, according to Herrera, there is high anxiety over what the future holds in terms of new types of threats and attacks. So we focus on making sure Juniper s solution has deep awareness of the devices being brought into the network and stays abreast of threats that impact different devices and the different operating systems those devices are using. Policing Access While security is the overwhelming concern of participants in the GateHouse survey, the growing reliance on mobile & remote devices creates anxiety and issues across a broad spectrum. Managing access over wired and wireless LAN infrastructure rates at a 3.35 on a scale of 1-to-5 in terms of critical issues. Other issues rating higher than the midpoint include provisioning new mobile devices, network performance degradation and the need for costly network upgrades. IT organizations are struggling with the best way to enable secure basic connectivity for mobile users across a wide variety of mobile platforms. A key challenge for these IT groups is how to maintain a consistent and uniform level of security policies across the mobile enterprise environment. They are also under tremendous pressure, internally and externally, to provide advanced anti-theft protection for lost or stolen mobile devices. What are the concerns around giving access to the enterprise network with consumerized technology? Security on mobile devices Security over the network infrastructure & data center Cost to support/regulate new mobile devices Managing access over wired and WLAN infrastructure Provisioning new mobile devices Network performance degradation Costly network upgrades required Rate 1 5, 1 = Unconcerned, 5 = Critically concerned 3.16 3.08 3.04 3.45 3.35 4.22 4.35 1 2 3 4 5

Top Network Considerations for Enterprise Mobility and BYOD 4 How long has it been since the last refresh of your wireless LAN and access switching infrastructure? 35% 30% 25% 20% 15% 10% 5% 0% 30% 28% 24% 23% 25% Over the past year, the number of respondents (39 percent) experiencing issues with guest access and device provisioning exceeded those (35 percent) who didn t. More than one-third experience issues around managing security policy end-to-end and just slightly less had bandwidth allocation issues. This all points back to the policies you create and how robust your policy solution is, says Herrera Having the ability to set policies that are context aware user, role, device and location based while enforcing these policies at every point in the network is crucial. With businesses increasingly reliant on wireless LAN as their primary access network, this is typically the first line of defense, Herrera notes. Enterprises need a solution that recognizes the identity and the role of the user; with certain devices there are known security threats so the network solution needs to recognize the device and the person behind it to be able to give them the access they need to do their job without compromising security, she says. Copyright 2013, Gatepoint Research. All rights reserved. The information contained in this report is the sole property of Gatepoint Research and may not be used, reproduced or redistributed in any form including, but not limited to, print and digital form without the express written consent of Gatepoint Research. www.gatepointresearch.com. Wireless LAN refresh 20% 9% Access switching refresh 15% 10% 12% Juniper Networks Enterprise Solution Juniper Networks designed enterprise network solutions that offer network protection, operational simplicity, stellar networking performance and flexibility, and total cost savings. Juniper Networks enterprise network solutions use one OS, consolidating management, network policy enforcement, and control functions. This significantly reduces the learning curve, requiring less training and providing additional cost savings for ongoing configuration and management. The company s Enterprise Mobility portfolio of resilient switching, security, and wireless products allows simple and secure access to business-critical information and collaboration. Juniper Mobile Security establishes barriers that secure the device, the network edge, and the application. It starts with qualifying the device, then provisioning and authenticating the user, and enforcing security policies at the user and application level. Juniper Mobile Security controls the device and avoids data leakage on an ongoing basis, and it can reach out to wipe out data if the device is lost or stolen. For more information, go to www.juniper.net/byod. 100 executives participated in the Gatepoint Research survey, with almost half working at the director level or higher. Respondents overwhelmingly work for large firms with more than half at companies with annual revenues greater than $1.5 billion. What concerns do you have about operating an environment with a mix of switches? IT staff training for two different vendors Capital and/or operational costs N/A here: we only use one brand Bandwidth management Integrating wireless network Onboarding BYOD, guest & corporate-owned devices Network management Compatibility issues between different vendors switches Updating policy across network Consistent user experience Maintenance & Diagnostics Rate 1 5, 1 = Unconcerned, 5 = Critically concerned 3.29 3.17 3.62 3.59 3.57 3.40 3.87 1 2 3 4 5