Learning from the learners

Share this article:
Learning from the learners
Learning from the learners

Many companies are struggling with how to allow employees to bring their personal devices to work and access the corporate network. A host of issues have to be addressed along the way, starting with who is actually on your network right now, is that person even allowed on your network, what devices are they using, and is it safe or is it infested with malware? 

All these bring-your-own-device (BYOD) challenges have already been addressed and overcome by educational institutions. The sector is where BYOD got its start, spurred by students armed with the latest mobile devices. Colleges and universities quickly realized that if they did nothing, students would find a way to get on the network anyway – just like employees are probably doing now, under the radar. 

This group has provided a great laboratory for the emergence of BYOD breakthroughs that organizations of all kinds use today. A key technology innovation is the ability to automatically identify every device trying to access the network, its software configuration, and the user associated with it. With this critical visibility, the next step is policy-based access control that enables companies to define rules governing network access according to the user's role with the organization and security status of their device, and then enforce those rules automatically. Together, this visibility and control allows thousands – or tens of thousands – of students, as well as faculty and guests, to come on campus with their personal devices and get the network resources they are authorized for, without jeopardizing security or overwhelming IT staff.

Our learning institutions continue to set the pace in BYOD, driving innovations to support the exotic devices students bring in, and integrations with advanced security solutions that correlate with network and device information to provide greater levels of protection. So, if your company is debating whether or not to introduce secure BYOD, the education marketplace can teach you a lot.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in Opinions

Falling off the 'Wagon of Things'

Falling off the 'Wagon of Things'

The Internet of Things promises so much. And so the question arises, how are we going to keep all this 'stuff' safe and secure?

Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring ...

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

Breach shaming and the need for a new model to discuss data breaches

Breach shaming and the need for a new ...

The breach shaming trend impedes forward progress in preventing such incidents in the future and leaves consumers worrying without educating them.