Upload
jason-boud
View
286
Download
0
Embed Size (px)
DESCRIPTION
Presentation on the path to pervasive wireless - An enterprise journey.
Citation preview
© 2013 Beyond Mobile Ltd 10 April 2023
THE PATH TO A PERVASIVE WIRELESS SERVICE
© 2013 Beyond Mobile Ltd 10 April 2023 2
CUSTOMER POLL
Quick show of hands
• Does your company offer any type of Wi-Fi solution in their premises ?
Keep it up if you allow
• employees on company laptops to use it ?• guest access to the internet via it ?• employee’s to use their personal devices on it?
© 2013 Beyond Mobile Ltd 10 April 2023 3
AGENDA
Wireless Networking – the changing landscape
The path to a pervasive wireless service
Q&A
© 2013 Beyond Mobile Ltd 10 April 2023 4
INTRODUCTION
An IT infrastructure specialist with over 20 years in the financial services sector.
11 years with Credit Suisse and 6 with Chase (JP Morgan)
Earlier this year I left Director in IT role for Credit Suisse to start Beyond Mobile.
Beyond Mobile offers Strategy, Product and Sales advice to technology companies in the early stage of their business plans and firms looking to buy enterprise mobility technology.
© 2013 Beyond Mobile Ltd 10 April 2023 5
Enterprise 1(Financial)
Enterprise 2(Financial)
Enterprise 3(consulting)
THE ANATOMY OF AN ENTERPRISE
140,000 65,000 20,000
150,000* 80,000 2,000
35,000* 15,000 20,000
200,000+ * 120,000 2,500
Yes Yes No
“dirty network”“clean network for employees” “clean network”
© 2013 Beyond Mobile Ltd 10 April 2023 6
EVIL INTERNET & WIRELESS
Wi-Fi BANNED
Custom laptops with Wi-Fi cards removed
Ethernet ports and drivers locked down
Remote access restricted to dial up
Almost impossible to be productive unless in the office
© 2013 Beyond Mobile Ltd 10 April 2023 7
EVOLUTION NOT REVOLUTION
© 2013 Beyond Mobile Ltd 10 April 2023
NETWORK PERIMETER SECURITY
8
© 2013 Beyond Mobile Ltd 10 April 2023 9
NETWORK STRATEGY
DEPERIMITISATION
© 2013 Beyond Mobile Ltd 10 April 2023 10
2007 – 1ST GEN WI-FI
CISO concedes some Wi-Fi allowed
“Managed” endpoints only
Guest internet access allowed
No employee personal devices allowed
User experience not considered
Wi-Fi Design poor
Global inconsistency
© 2013 Beyond Mobile Ltd 10 April 2023 11
2007 – 1ST GEN WI-FI
© 2013 Beyond Mobile Ltd 10 April 2023 12
2009 CHALLENGERS
“Why can’t I use the corporate Wi-Fi to sync my work email”
“Cellular coverage is so bad in my building and it’s crazy employee’s cant use the Corporate Wi-Fi on their personal devices”
Crumbling of IT Walled gardens
© 2013 Beyond Mobile Ltd 10 April 2023 13
2011 THE GAME CHANGED
Real estate smart strategies
Wi-Fi shifted to a core “enabling” technology and business enabler.
BYOD strategy was built demanding better services
CIO – build it quick but I wouldn’t start from there, if I was you
Poor coverage, low contention, IT vs. Business
© 2013 Beyond Mobile Ltd 10 April 2023 14
COMPARING ENTERPRISE APPROACHES
Projects requirements vs. long term strategy
How to define policies for different user groups
Skills you need to support the service
© 2013 Beyond Mobile Ltd 10 April 2023 15
PROJECT REQUIREMENTS
Guest Employee 1 Employee 2
Standard Complex
© 2013 Beyond Mobile Ltd 10 April 2023 16
Guest Employee 1 - Standard Employee 2 – complex
POLICIES FOR DIFFERENT GROUPS
Medium Medium High
Low Med High / Regulated
Personal Corporate or Personal Corporate
Yes Yes Yes & Corporate
None MAM MDM & MAM
No Yes Yes
© 2013 Beyond Mobile Ltd 10 April 2023 17
Guest Policy
Network Access Untrusted / DMZ
Authentication Username/password
Content Filtered No
Posture checked No
Accept Use policy Yes
POLICIES FOR DIFFERENT COMPANIES
Emp. Personal Policy
Network Access Untrusted / DMZ
Authentication Tied into AD
Content Filtered Yes
Posture checked None
Accept Use policy Yes & Web Redirect
Enterprise 1 Enterprise 2
Guest Policy
Network Access Untrusted / DMZ
Authentication Username/password
Content Filtered No
Posture checked No
Accept Use policy Yes
Emp. Personal Policy
Network Access Untrusted / DMZ
Authentication SSL VPN
Content Filtered Yes
Posture checked Downloadable client
Accept Use policy Re-registered 90 days
© 2013 Beyond Mobile Ltd 10 April 2023 18
POLICIES FOR DIFFERENT COMPANIES
Corporate Device Policy
Network Access Secure 802.1x / EAP TLS
Authentication Mutual auth certificates
Content Filtered Yes
Posture checked Trusted build
Accept Use policy Yes / Annual IT Policy
Enterprise 1 Enterprise 2
Corporate Device Policy
Network Access Untrusted / DMZ
Authentication VPN with Smartcard
Content Filtered Yes
Posture checked Trusted build
Accept Use policy Yes /
© 2013 Beyond Mobile Ltd 10 April 2023
Is your Wi-Fi initiative IT driven vs. business driven?
Do you have you a regular dialogue with stakeholders to understand their risk posture?
Does your organisation get additional funding for building Wi-Fi access?
What are the skills required to support your BYOD & wireless strategy?
What else is important?
Q & A / ROUNDTABLE
© 2013 Beyond Mobile Ltd 10 April 2023
THE PATH TO A PERVASIVE WIRELESS SERVICE