Learning from the learners

Share this article:
Learning from the learners
Learning from the learners

Many companies are struggling with how to allow employees to bring their personal devices to work and access the corporate network. A host of issues have to be addressed along the way, starting with who is actually on your network right now, is that person even allowed on your network, what devices are they using, and is it safe or is it infested with malware? 

All these bring-your-own-device (BYOD) challenges have already been addressed and overcome by educational institutions. The sector is where BYOD got its start, spurred by students armed with the latest mobile devices. Colleges and universities quickly realized that if they did nothing, students would find a way to get on the network anyway – just like employees are probably doing now, under the radar. 

This group has provided a great laboratory for the emergence of BYOD breakthroughs that organizations of all kinds use today. A key technology innovation is the ability to automatically identify every device trying to access the network, its software configuration, and the user associated with it. With this critical visibility, the next step is policy-based access control that enables companies to define rules governing network access according to the user's role with the organization and security status of their device, and then enforce those rules automatically. Together, this visibility and control allows thousands – or tens of thousands – of students, as well as faculty and guests, to come on campus with their personal devices and get the network resources they are authorized for, without jeopardizing security or overwhelming IT staff.

Our learning institutions continue to set the pace in BYOD, driving innovations to support the exotic devices students bring in, and integrations with advanced security solutions that correlate with network and device information to provide greater levels of protection. So, if your company is debating whether or not to introduce secure BYOD, the education marketplace can teach you a lot.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in Opinions

Beware of the malware walking dead

Beware of the malware walking dead

This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.

Why the Home Depot attack shouldn't have happened

Why the Home Depot attack shouldn't have happened

Major retailers are falling prey to massive credit card information heists, despite spending millions on cyber security systems.

Next-generation malware: Think like the enemy and avoid the car alarm problem

Next-generation malware: Think like the enemy and avoid ...

When it comes to enterprise security, one rule remains constant - attacks will continue to increase in sophistication and attackers will seek to outmaneuver existing defenses.