NSW Government. Wireless services (WiFi) Standard

Size: px
Start display at page:

Download "NSW Government. Wireless services (WiFi) Standard"

Transcription

1 NSW Government Wireless services (WiFi) Standard May 2014

2 CONTENTS 1. CONTEXT Background Purpose Scope and application 2 2. STANDARDS GOVERNANCE Standards to support the ICT Service Catalogue Managing standards Data Standards Developing standards Implementing standards Reference Documents 3 3. POLICY STATEMENT Definitions Key principles 5 4. STANDARD Minimum requirements Implementing a WiFi Service 6 DOCUMENT CONTROL 8 1

3 1. CONTEXT 1.1. Background Developing whole of NSW government ICT technical standards is a key initiative of the NSW Government ICT Strategy 2012, driven by the ICT Procurement and Technical Standards Working Group. This Standard has been developed through these arrangements. Wireless (WiFi) technology is not merely pervasive, but is increasingly the first choice of the public and private sectors alike. The benefits of utilising WiFi technology are clear: it provides the flexibility, choice and adaptability needed in the contemporary workplace. NSW Government agencies must be in a position to fully leverage the potential advantages of WiFi technology, including the benefits of public WiFi networks. Sourcing WiFi services from the cloud will ensure that agencies are able to consume WiFi in a scalable way, and to smoothly transition to next generation technology without designing costly internal solutions. The purpose of this standard is to set out the minimum business and technical requirements that apply to public wireless networks used by NSW Government agencies. The standard will be used as a tool for assessing services for addition to the NSW ICT Service Catalogue, supports the use of WiFi services that are designed to meet modern workforce needs, and promotes the use of WiFi services which can be used by multiple agencies if required Purpose This Standard sets out the business and technical requirements for sourcing WiFi on an as a service basis. It details the issues that need to be considered so each agency can identify the available options that best suit their business requirements. The Standard has been developed to assist agencies to procure, develop, deploy and take full advantage of the benefits of wireless technology. It provides important guidance to assist vendors to review their services for alignment with the NSW Government s expected baseline and ideal requirements of the NSW Government Scope and application This standard falls within the framework of the NSW Government ICT Strategy. It applies to all NSW Government departments, statutory bodies and shared service providers. It does not apply to state owned corporations, but is recommended for their adoption. 2. STANDARDS GOVERNANCE 2.1. Standards to support the ICT Service Catalogue 2

4 2.2. Managing standards Standards are enduring and should not require modification as technology changes, however there is scope to modify them through the governance arrangements if necessary. Given the nature of this standard it is intended that an annual review will occur Standards are designed to add value, augment and be complementary to, other policies. The standards leverage principles defined in the NSW Government ICT Strategy, the NSW Government Cloud Policy and Data and Information Management guidelines. This framework does not override nor circumvent the responsibilities of an agency nor any employee regarding the management and disposal of information, data, and assets. Standards in ICT procurement must address business requirements for service delivery Data Standards This standard should be applied with data and information management standards in accordance with Premier s Memorandum M Digital Information Security Policy. NSW Government agencies must carefully consider their obligations to manage government data and information. Contract arrangements and business processes should address requirements for data security, privacy, access, storage, management, retention and disposal. ICT systems and services should support data exchange, portability and interoperability Developing standards The ICT Procurement and Technical Standards (PTS) Working Group is chaired by the Department of Finance and Services and includes senior representation from across the NSW Government clusters. Agencies engage with the PTS Working Group concerning services for inclusion in the ICT Service Catalogue. The PTS Working Group has the leading role in reviewing and endorsing the technical standards developed in response to agencies requirements. The PTS Working Group is supported by three sub groups responsible for the areas of telecommunications, software and hardware. The sub-groups are responsible for initial development and review of standards relating to their areas of responsibility (such as hardware, software or telecommunications). The ICT Leadership Group, comprising Chief Information Officers and senior business managers from across government, is responsible for final approval of technical standards Implementing standards Procurement NSW facilitates the implementation of the standards by applying them to the goods and services made available through ICT Services Catalogue. The Standards are also available on the ProcurePoint web site Reference Documents This document has been informed by the following internationally recognised standard: The Institute of Electrical and Electronic Engineers (IEEE) suite of standards for Wireless Local Area Networks, including: o ac 1 Very High Throughput Amendment o n Amendment o u Protocol ac is fully backwards compatible with n and g 3

5 Agencies should also have regard to the below statutory rules, NSW Government policies and standards: AS/NZS ISO Risk management - Principles and guidelines Electronic Transactions Act 2000 Government Information (Information Commissioner) Act 2009 Government Information (Public Access) Act 2009 Health Records and Information Privacy Act 2002 M Digital Information Security Policy NSW Government Open Data Policy NSW Government Cloud Services Policy and Guidelines NSW Government ICT Strategy NSW Government ICT Technical Standards Mobility Framework TPP Internal Audit and Risk Management Policy for the NSW Public Sector Privacy and Personal Information Protection Act 1998 NSW Procurement: Small and Medium Enterprises Policy Framework State Records Act 1998 Copyright Act 1968 Copyright Amendment Act POLICY STATEMENT 3.1. Definitions Access point type - An entity that contains one station (STA) and provides access to the distribution services, via the wireless medium for associated STAs. Access point path - Path between two tunnelled direct-link setup (TDLS) peer stations (STAs) via the AP with which the STAs are currently associated. Application Software designed to assist end users to carry out useful tasks. Examples of applications may include the Microsoft Office suite of products or smartphone applications such as Google Maps. Beamforming An advanced signal processing technique that controls the direction of WiFi transmissions as well as the reception of radio signals. Bring Your Own Device (BYOD) - Any electronic device owned, leased or operated by an employee or contractor of and agency which is capable of storing data and connecting to a network, including but not limited to mobile phones, smartphones, tablets, laptops, personal computers and netbooks. Data - Any and all information stored or processed via a WiFi network. Encryption The conversion of data into an encrypted format so that it cannot be understood by unauthorised users. Mobile Device Management (MDM) Solution which manages, supports, secures and monitors mobile devices. <Note: <Agency> will conduct risk assessments to determine whether their environment requires the implementation or not of such a solution. Implementation should ideally be done as a Service in accordance with NSW Government policy>. Quality of Service (QoS) The performance of a computer or telephony network, measured by bandwith, service disruptions, and error rates. Verification A means of checking that data is accurate, consistent and has not been corrupted. 4

6 3.2. Key principles The purpose of this Standard is to assist NSW Government agencies to source and apply public WiFi networks, and to provide access arrangements to those networks. The Standard assists suppliers to understand the NSW Government s expected standard requirements for WiFi. Alignment with international best practice: The underpinning purpose of sourcing as a service is to allow agencies to access and consume the best off-the shelf ICT services in a scalable and flexible way, rather than procuring or developing bespoke solutions that fail to keep pace with new developments in technology. Rather than designing a new series of bespoke technical requirements for WiFi technology the NSW Government will rely on the best practice specifications contained in the IEEE suite of standards (see Part 4). WiFi services advertised and sourced via the NSW ICT Service Catalogue must align with IEEE802.11n: Next generation Wireless LAN Technology at minimum, with the ability to transition to alignment with IEEE ac within a reasonable period. Public WiFi networks must align with the requirements of the IEEE u Protocol, or must have the capability of transitioning to alignment with IEEE u within a reasonable period. Ideally, public wireless service providers will be certified through the Wi-Fi Alliance s Wi-Fi Certified PassPoint. In addition, the following overarching principles apply to WiFi networks for use by NSW Government agencies: Mobile and flexible: The wireless network must support the modern business environment, including flexible work practices such as activity based working and hot desking. The service must support guest, public and private access, including access for BYOD devices. Vendor/ operating environment agnostic: The WiFi network should be accessible via a wide range of device and operating environment types. Devices such as laptops, mobile devices (including agency supplied and BYODs), printers, protectors, lighting systems, security cameras and IP telephony should be able to connect to, and access the network. The network should also be fully compatible with widely used operating environments. Fast: The WiFi service should be fast and should have the capability of maintaining fast speeds for a large number of users. As a general guide, the service should be capable of speeds aligning with IEEE802.11n at minimum. Reliable, scalable and dynamic: The wireless network must be reliable, scalable, and able to adapt to dynamic changes in traffic type and volume without causing disruptions to the user or server experience. Handover between access points should be seamless. Ideally, the service should incorporate the beamforming signal processing technique to improve performance, reliability and range. Supports applications and advanced functionality: The WiFi network should be able to support traditional data and multimedia applications such as Voice over IP (VOIP), videoconferencing and instant messaging. The WiFi network must also support advanced WiFi functionality such as specialist handling of voice, video, presence and printing from providers such as Apple, Cisco, Microsoft and IPFX. Authentication and access operation: The WiFi service should grant access to the network based on user and device identity, with reference to multiple MDM, LDAP and Network Management systems. Information capture and recording: The WiFi service must provide sufficient live information to enable diagnosis and to resolution of location, connection and performance issues. The WiFi service must also capture sufficient information for accurate, complete and fully auditable logs suitable for financial management and information security purposes. 5

7 4. STANDARD 4.1. Minimum requirements As outlined at Part 3, the NSW Government will rely on the best practice specifications contained in the IEEE suite of standards. Table 1 below summarises, at a high level, the expected technical features expected in a baseline and an ideal WiFi service: Table 1: Expected technical features Alignment with relevant IEEE standard QoS Access types Baseline Layer 1 Internet Layer 2 Data Layer 3 Real time VOIP and video Guest Private Public Mobile device support IOS Android Blackberry Window Verification (User) Local Back to home VoIP Video Broadcast Streaming Seamless handover between access points Encryption Beamforming Ideal Layer 1 Internet Layer 2 Layer 3 Data Layer 4 Voice Layer 5 - Video 4.2. Implementing a WiFi Service Agencies should align their WiFi service implementations with known best practice. Generally, implementation should incorporate the following processes: Service initiation Prepare the site survey and plan infrastructure, including connecting the relevant service provider and tenant carriage service to primary and secondary data centres. Review projected tenant requirements and prepare an initial and projected capacity plan setting out the expected traffic types, volumes, peak and off peak periods. Install and commission infrastructure and build documentation, including the connections between the service and existing tenant infrastructure. 6

8 4.2.2 Service Operation Apply ITIL Service Management practices and processes. These include: a 24 hour a day service desk facility; incident and problem management processes; capacity monitoring and management; and regular hardware and software maintenance. Authentication and access management o Apply the appropriate access policies to connections based on user and device identity. o Depending on the agency s requirements, public customers may be provided with guest access for public customers, while BYOD devices may be provided with restricted access and QoS. o Access to the network should be based on user and device identity, by reference to multiple MDM, LDAP and network management principles. Shared WiFi Service Operation: o Enable shared WiFi service operation through the provision of data services in line with the relevant service level agreement and capacity plan. o Where the agency has local infrastructure, provide access to local network resources, where the agency has local infrastructure. o Where the agency has no local infrastructure, provide a tunneled service back to the primary or secondary data centre. Real time operational data o Share real time operational data with the tenant s service desk to enable the tenant to identity users, connection times and types, authentication and the application of access policy. The data shared should include: Reporting user location information from a single list of users/devices traffic volume and throughput data by user and/or device user troubleshooting information (for example, log data). o Maintain, monitor and validate access log history for security reporting and remedial action. o Deliver reports that support accounting and chargeback by tenant, device type and user. o Support data accounting per application flow and/or user and device. 7

9 DOCUMENT CONTROL Document history Status: Final Version: 1.0 Approved by: Procurement and Technical Standards Working Group Approved on: 22 May 2014 Contact: John Thomas, Director, ICT Services, ICT Policy, Office of Finance and Services Telephone: (02) Review date This standard will be reviewed in 12 months. It may be reviewed earlier in response to post implementation feedback from Departments. 8

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015 NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

NSW Government. End User Computing Standard. Version 1.0. October 2014

NSW Government. End User Computing Standard. Version 1.0. October 2014 NSW Government End User Computing Standard Version 1.0 October 2014 standards@finance.nsw.gov.au ICT Services Office of Finance & Services Level 23, McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS

More information

NSW Government. Messaging, Collaboration and Unified Communications Standard. Version 1.0. October 2014

NSW Government. Messaging, Collaboration and Unified Communications Standard. Version 1.0. October 2014 NSW Government Messaging, Collaboration and Unified Communications Standard Version 1.0 October 2014 standards@finance.nsw.gov.au ICT Services Office of Finance & Services Level 23, McKell Building 2-24

More information

NSW Government. Telecommunications: SIP (Session Initiation Protocol) Standard

NSW Government. Telecommunications: SIP (Session Initiation Protocol) Standard NSW Government Telecommunications: SIP (Session Initiation Protocol) Standard October 2014 CONTENTS 1. Context 3 2. Required NSW Government business outcomes 3 3. Additional business outcomes for agency

More information

Increased Productivity

Increased Productivity OpenScape Mobile V7 OpenScape Mobile V7 is the next-generation mobile client of Unify for the latest mobile phones and tablets. It combines SIP-based VoIP, UC, and video features into one single application.

More information

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT POSITION: REPORTS TO: LOCATED: ICT Service Desk Team Leader ICT Services Design Manager Kings Way, South Melbourne DATE: March 2015 ORGANISATIONAL ENVIRONMENT Melbourne City Mission is a leader and innovator

More information

UNB s Mobility Strategy 2016 2017

UNB s Mobility Strategy 2016 2017 UNB s Mobility Strategy 2016 2017 The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative mobile technologies that

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

NSW Government. Mobility Solutions Framework. Version 1.0

NSW Government. Mobility Solutions Framework. Version 1.0 NSW Government Mobility Solutions Framework Version 1.0 NSW Government ICT Technical Standards Mobility Solutions Framework CONTENTS 1. CONTEXT 3 1.1. Background 3 1.2. Purpose 3 1.3. Scope and Application

More information

Welcome to the era of the anywhere worker

Welcome to the era of the anywhere worker Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

NSW Government. Mobile Device & Application Framework. Version 1.0

NSW Government. Mobile Device & Application Framework. Version 1.0 NSW Government Mobile Device & Application Framework Version 1.0 standards@finance.nsw.gov.au ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS 1. CONTEXT

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

www.quicknetworksolutions.net RC: 960240

www.quicknetworksolutions.net RC: 960240 QSL is a growing business that s offering IT Solutions and services to SME and Established Organizations with a high level of understanding and fully qualified, friendly and knowledgeable consultants.

More information

Innovation in Security. Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century

Innovation in Security. Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century Innovation in Security Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century The complete Security Solution for SIP and Unified Communications designed

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary

More information

Overview. Unified Communications

Overview. Unified Communications OpenScape Mobile V7 OpenScape Mobile is the next-generation mobile client of Unify, for the latest mobile phones and tablets. It combines SIP-based VoIP, UC and video features into one single application.

More information

Components. Key features

Components. Key features BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from

More information

University of Strathclyde: Information Services Directorate Operational Plan for 2014/15

University of Strathclyde: Information Services Directorate Operational Plan for 2014/15 University of Strathclyde: Information Services Directorate Operational Plan for 2014/15 Enabling the future: transforming our information systems and technology 2014/15 2014/2015 CONTENTS 1 DRIVERS, STRATEGIC

More information

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath. CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Software-Defined Networking for Wi-Fi White Paper

Software-Defined Networking for Wi-Fi White Paper Software-Defined Networking for Wi-Fi Introduction Software-Defined Networking for Wi-Fi The explosion in the number and diversity of wireless devices in today s enterprise networks has increased the pressure

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

Lot 3 Service Specification MANAGED MOBILE SERVICE

Lot 3 Service Specification MANAGED MOBILE SERVICE Lot 3 Service Specification MANAGED MOBILE SERVICE Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED MOBILE SERVICE Fujitsu Managed Mobile is a global service providing lifecycle management services

More information

Secure Wireless Networking

Secure Wireless Networking Secure Wireless Networking In today s connected world, people expect seamless connectivity to their networks and the Internet. That s why Cisco Small Business Wireless s offer expanded range and coverage

More information

[Type text] SERVICE CATALOGUE

[Type text] SERVICE CATALOGUE [Type text] SERVICE CATALOGUE IT Services 1 IT Support and Management Services SERVICE AREA: SERVICE DESK Users can contact the Service Desk via the phone or an online web form for all their ICT service

More information

collaboration Keeping people in touch efficiently

collaboration Keeping people in touch efficiently collaboration Keeping people in touch efficiently What is collaboration? At its best, unified communications (UC) is just what it says it enables better interaction between people by integrating what were

More information

NSW Government. Document Management Solutions Standard. v1.0. June 2015

NSW Government. Document Management Solutions Standard. v1.0. June 2015 NSW Government Document Management Solutions Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au CONTENTS 1.

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

UNIFIED COMMUNICATIONS. Keeping people in touch efficiently

UNIFIED COMMUNICATIONS. Keeping people in touch efficiently UNIFIED COMMUNICATIONS Keeping people in touch efficiently WHAT ARE UNIFIED COMMUNICATIONS? At its best, unified communications (UC) is just what it says it enables better interaction between people by

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e M o b i l e

More information

How To Manage An 802.11 Wireless Network At A University

How To Manage An 802.11 Wireless Network At A University WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits

More information

Empower the Workforce With BYOD and Collaboration 5 propose

Empower the Workforce With BYOD and Collaboration 5 propose Empower the Workforce with BYOD and Collaboration Cloud-Based Unified Communications Enhances BYOD Strategies January 2014 Prepared by: Zeus Kerravala Empower the Workforce with BYOD and Collaboration

More information

WHITE PAPER. Deploying Mobile Unified Communications for Avaya

WHITE PAPER. Deploying Mobile Unified Communications for Avaya WHITE PAPER Deploying Mobile Unified Communications for Avaya Table of Contents 1. Introduction...3 2. What are the drivers for deploying Mobile Unified Communications?... 3 3. What factors influence which

More information

HP Networking and Aastra

HP Networking and Aastra HP Networking and Aastra Solution whitepaper Table of contents Executive Summary... 2 Introduction... 3 HP Networking and Aastra: A true alliance... 4 Commitment to open standards... 4 Session Initiation

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Job Description Information Services Coordinator

Job Description Information Services Coordinator Job Description Position Title: Information Services Coordinator Department: Reports To: Technology & Infrastructure Manager Purpose The Information Services Coordinators role is to ensure the stability,

More information

Higher Education Solutions

Higher Education Solutions Higher Education Solutions Higher education communications THE CHALLENGES Whilst IP Communications brings many advantages, the cost and complexity of moving users in a single step can be overwhelming.

More information

BT Hosted IPT (VoIP)

BT Hosted IPT (VoIP) BT Hosted IPT (VoIP) What is Convergence? Currently, we see applications on distinct technologies Voice PBX / ISDN / PSTN Data LAN / WAN Video Dedicated VC link What is Convergence? Currently, we see applications

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

646-976. Cisco Data Center Network Solutions Sales Exam. http://www.examskey.com/646-976.html

646-976. Cisco Data Center Network Solutions Sales Exam. http://www.examskey.com/646-976.html Cisco 646-976 Cisco Data Center Network Solutions Sales Exam TYPE: DEMO http://www.examskey.com/646-976.html Examskey Cisco 646-976 exam demo product is here for you to test the quality of the product.

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility

SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...

More information

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white

More information

eircom unified communications solutions giving your teams the power to deliver

eircom unified communications solutions giving your teams the power to deliver eircom unified communications solutions giving your teams the power to deliver In a fast-moving world, information is power Business today moves fast: If your teams can t easily access the right resources

More information

ICTTEN5204A Produce technical solutions from business specifications

ICTTEN5204A Produce technical solutions from business specifications ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor

More information

BES10 Cloud architecture and data flows

BES10 Cloud architecture and data flows BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Virtual Workplace Agility & reliability for your future workplace Balancing freedom & control Virtual working is essential and you know the virtual workplace is possible.

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Introducing VEGA. www.vega-global.eu. Communications made easy. Video Communications. Skype For Business & Collaboration. Audio Visual Solutions

Introducing VEGA. www.vega-global.eu. Communications made easy. Video Communications. Skype For Business & Collaboration. Audio Visual Solutions Introducing VEGA Video Communications Audio Visual Solutions Skype For Business & Collaboration Digital Media Communications Telephony & Voice Workspace Management www.vega-global.eu Communications made

More information

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.

Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. The use of mobile technology in the classroom has increased exponentially

More information

Meru MobileFLEX Architecture

Meru MobileFLEX Architecture Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling

More information

Subtitle. VoIP Migration Strategy. Keys to a Successful Planning and Transition. VoIP Migration Strategy Compare Business Products 2014 1

Subtitle. VoIP Migration Strategy. Keys to a Successful Planning and Transition. VoIP Migration Strategy Compare Business Products 2014 1 Subtitle VoIP Migration Strategy Keys to a Successful Planning and Transition VoIP Migration Strategy Compare Business Products 2014 1 Contents Introduction... 3 VoIP Defined... 3 Why Are Businesses Opting

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

Building the Lync Security Eco System in the Cloud Fact Sheet.

Building the Lync Security Eco System in the Cloud Fact Sheet. Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure and deliver a compliant cloud solution to all transactions in and out of the fastest growing Universal Communication

More information

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This

More information

Medical Grade Network Design and Operation

Medical Grade Network Design and Operation Medical Grade Network Design and Operation Chesapeake NetCraftsmen has been supporting our health care customers with designs and implementations of 'Medical Grade Networks'. In this whitepaper we will

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

RETAIL COMMUNICATIONS

RETAIL COMMUNICATIONS RETAIL SOLUTIONS RETAIL solutions RETAIL COMMUNICATIONS THE CHALLENGES Your employees are busy serving in-store customers, the phones are ringing unanswered; will missed calls result in missed sales opportunities?

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Mobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution

Mobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution Solution Overview Mobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution Cisco Instant Connect: Time-Tested Interoperability Solution in the Public and Private Sectors Cisco

More information

Mobility Challenge. Challenge #1: User Experience:

Mobility Challenge. Challenge #1: User Experience: Mobility Challenge Challenge #1: User Experience: Explosion of wireless devices drives wireless access needs and issues Need for video support for distance learning, rich digital content and professional

More information

Flinders University. Telehealth in the Home. Video Strategy Discussion Paper. 2 October 2013

Flinders University. Telehealth in the Home. Video Strategy Discussion Paper. 2 October 2013 Flinders University Telehealth in the Home Video Strategy Discussion Paper 2 October 2013 Further information: Alan Taylor, Project Manager alan.taylor@flinders.edu.au Page 1 of 14 A AUTHORS A.1 Project

More information

Elfiq Networks Vital for Hospitality

Elfiq Networks Vital for Hospitality Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...

More information

SIMPLIFY YOUR BUSINESS COMMUNICATIONS

SIMPLIFY YOUR BUSINESS COMMUNICATIONS SIMPLIFY YOUR BUSINESS COMMUNICATIONS CONTENTS COMMUNICATIONS AS ONE 01 01 CAN HELP TRANSFORM YOUR BUSINESS 03 A SIMPLER EXPERIENCE 04 WHY CHOOSE OPTUS? 05 1 COMMUNICATIONS AS ONE Businesses today are

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Mobilizing Business Applications, Efficiently and Affordably

Mobilizing Business Applications, Efficiently and Affordably VERIZON APPLICATIONS AND CLOUD Mobilizing Business Applications, Efficiently and Affordably Mobile connectivity has become a way of life and an expectation for much of today s workforce. With pervasive

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,

More information

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1 BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President

More information

Service Providers and WebRTC

Service Providers and WebRTC Whitepaper Service Providers and WebRTC New Product Opportunities Over- the- Top (OTT) services are those that deliver communications features to customers but are apps running on the data network rather

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

The CIO s Guide to Fixed Mobile Convergence

The CIO s Guide to Fixed Mobile Convergence Executive Overview The CIO s Guide to Fixed Mobile Convergence Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending

More information

WLAN solutions to manage 1:1 and BYOD in K-12

WLAN solutions to manage 1:1 and BYOD in K-12 MERU EDUCATION-GRADE SOLUTIONS FOR UNINTERRUPTED LEARNING SOLUTION BRIEF K-12 WLAN solutions to manage 1:1 and BYOD in K-12 BYOD Solutions for K-12/primary schools 1:1 computing where students are provided

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Apple Configurator MDM Site - Review

Apple Configurator MDM Site - Review Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?

More information

AC1750 Smart WiFi Router 802.11ac Dual Band Gigabit

AC1750 Smart WiFi Router 802.11ac Dual Band Gigabit Performance & Use AC1750 AC1750 WiFi 450+1300 Mbps speeds High-powered external antennas 1750 DUAL BAND 450+1300 RANGE Ideal for homes with 12 or more WiFi devices NETGEAR genie App Enjoy more of your

More information

VoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector.

VoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector. VoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector. The future of voice communication for education. Together with our partners at New Star Networks,

More information

IT Managed Services Network services Collaboration

IT Managed Services Network services Collaboration IT Managed Services Network services Collaboration aap 3 is one of the most professional companies that I have ever worked with. They have listened to our requirements and reacted with flexibility that

More information

Wireless Networking Solutions for Schools. Assisting schools with the implementation of a trusted safe and secure wireless network.

Wireless Networking Solutions for Schools. Assisting schools with the implementation of a trusted safe and secure wireless network. Wireless Networking Solutions for Schools. Assisting schools with the implementation of a trusted safe and secure wireless network. Wireless networking for schools. As an accredited Ruckus Wireless Partner,

More information

Understanding the IEEE 802.11ac Wi Fi Standard Preparing for the next gen of WLAN

Understanding the IEEE 802.11ac Wi Fi Standard Preparing for the next gen of WLAN WHITEPAPER Understanding the IEEE 802.11ac Wi Fi Standard Preparing for the next gen of WLAN July 2013 Author: Richard Watson Contributors: Dennis Huang, Manish Rai Table of Contents Executive summary...

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information