NSW Government. Wireless services (WiFi) Standard
|
|
- Buddy Barker
- 8 years ago
- Views:
Transcription
1 NSW Government Wireless services (WiFi) Standard May 2014
2 CONTENTS 1. CONTEXT Background Purpose Scope and application 2 2. STANDARDS GOVERNANCE Standards to support the ICT Service Catalogue Managing standards Data Standards Developing standards Implementing standards Reference Documents 3 3. POLICY STATEMENT Definitions Key principles 5 4. STANDARD Minimum requirements Implementing a WiFi Service 6 DOCUMENT CONTROL 8 1
3 1. CONTEXT 1.1. Background Developing whole of NSW government ICT technical standards is a key initiative of the NSW Government ICT Strategy 2012, driven by the ICT Procurement and Technical Standards Working Group. This Standard has been developed through these arrangements. Wireless (WiFi) technology is not merely pervasive, but is increasingly the first choice of the public and private sectors alike. The benefits of utilising WiFi technology are clear: it provides the flexibility, choice and adaptability needed in the contemporary workplace. NSW Government agencies must be in a position to fully leverage the potential advantages of WiFi technology, including the benefits of public WiFi networks. Sourcing WiFi services from the cloud will ensure that agencies are able to consume WiFi in a scalable way, and to smoothly transition to next generation technology without designing costly internal solutions. The purpose of this standard is to set out the minimum business and technical requirements that apply to public wireless networks used by NSW Government agencies. The standard will be used as a tool for assessing services for addition to the NSW ICT Service Catalogue, supports the use of WiFi services that are designed to meet modern workforce needs, and promotes the use of WiFi services which can be used by multiple agencies if required Purpose This Standard sets out the business and technical requirements for sourcing WiFi on an as a service basis. It details the issues that need to be considered so each agency can identify the available options that best suit their business requirements. The Standard has been developed to assist agencies to procure, develop, deploy and take full advantage of the benefits of wireless technology. It provides important guidance to assist vendors to review their services for alignment with the NSW Government s expected baseline and ideal requirements of the NSW Government Scope and application This standard falls within the framework of the NSW Government ICT Strategy. It applies to all NSW Government departments, statutory bodies and shared service providers. It does not apply to state owned corporations, but is recommended for their adoption. 2. STANDARDS GOVERNANCE 2.1. Standards to support the ICT Service Catalogue 2
4 2.2. Managing standards Standards are enduring and should not require modification as technology changes, however there is scope to modify them through the governance arrangements if necessary. Given the nature of this standard it is intended that an annual review will occur Standards are designed to add value, augment and be complementary to, other policies. The standards leverage principles defined in the NSW Government ICT Strategy, the NSW Government Cloud Policy and Data and Information Management guidelines. This framework does not override nor circumvent the responsibilities of an agency nor any employee regarding the management and disposal of information, data, and assets. Standards in ICT procurement must address business requirements for service delivery Data Standards This standard should be applied with data and information management standards in accordance with Premier s Memorandum M Digital Information Security Policy. NSW Government agencies must carefully consider their obligations to manage government data and information. Contract arrangements and business processes should address requirements for data security, privacy, access, storage, management, retention and disposal. ICT systems and services should support data exchange, portability and interoperability Developing standards The ICT Procurement and Technical Standards (PTS) Working Group is chaired by the Department of Finance and Services and includes senior representation from across the NSW Government clusters. Agencies engage with the PTS Working Group concerning services for inclusion in the ICT Service Catalogue. The PTS Working Group has the leading role in reviewing and endorsing the technical standards developed in response to agencies requirements. The PTS Working Group is supported by three sub groups responsible for the areas of telecommunications, software and hardware. The sub-groups are responsible for initial development and review of standards relating to their areas of responsibility (such as hardware, software or telecommunications). The ICT Leadership Group, comprising Chief Information Officers and senior business managers from across government, is responsible for final approval of technical standards Implementing standards Procurement NSW facilitates the implementation of the standards by applying them to the goods and services made available through ICT Services Catalogue. The Standards are also available on the ProcurePoint web site Reference Documents This document has been informed by the following internationally recognised standard: The Institute of Electrical and Electronic Engineers (IEEE) suite of standards for Wireless Local Area Networks, including: o ac 1 Very High Throughput Amendment o n Amendment o u Protocol ac is fully backwards compatible with n and g 3
5 Agencies should also have regard to the below statutory rules, NSW Government policies and standards: AS/NZS ISO Risk management - Principles and guidelines Electronic Transactions Act 2000 Government Information (Information Commissioner) Act 2009 Government Information (Public Access) Act 2009 Health Records and Information Privacy Act 2002 M Digital Information Security Policy NSW Government Open Data Policy NSW Government Cloud Services Policy and Guidelines NSW Government ICT Strategy NSW Government ICT Technical Standards Mobility Framework TPP Internal Audit and Risk Management Policy for the NSW Public Sector Privacy and Personal Information Protection Act 1998 NSW Procurement: Small and Medium Enterprises Policy Framework State Records Act 1998 Copyright Act 1968 Copyright Amendment Act POLICY STATEMENT 3.1. Definitions Access point type - An entity that contains one station (STA) and provides access to the distribution services, via the wireless medium for associated STAs. Access point path - Path between two tunnelled direct-link setup (TDLS) peer stations (STAs) via the AP with which the STAs are currently associated. Application Software designed to assist end users to carry out useful tasks. Examples of applications may include the Microsoft Office suite of products or smartphone applications such as Google Maps. Beamforming An advanced signal processing technique that controls the direction of WiFi transmissions as well as the reception of radio signals. Bring Your Own Device (BYOD) - Any electronic device owned, leased or operated by an employee or contractor of and agency which is capable of storing data and connecting to a network, including but not limited to mobile phones, smartphones, tablets, laptops, personal computers and netbooks. Data - Any and all information stored or processed via a WiFi network. Encryption The conversion of data into an encrypted format so that it cannot be understood by unauthorised users. Mobile Device Management (MDM) Solution which manages, supports, secures and monitors mobile devices. <Note: <Agency> will conduct risk assessments to determine whether their environment requires the implementation or not of such a solution. Implementation should ideally be done as a Service in accordance with NSW Government policy>. Quality of Service (QoS) The performance of a computer or telephony network, measured by bandwith, service disruptions, and error rates. Verification A means of checking that data is accurate, consistent and has not been corrupted. 4
6 3.2. Key principles The purpose of this Standard is to assist NSW Government agencies to source and apply public WiFi networks, and to provide access arrangements to those networks. The Standard assists suppliers to understand the NSW Government s expected standard requirements for WiFi. Alignment with international best practice: The underpinning purpose of sourcing as a service is to allow agencies to access and consume the best off-the shelf ICT services in a scalable and flexible way, rather than procuring or developing bespoke solutions that fail to keep pace with new developments in technology. Rather than designing a new series of bespoke technical requirements for WiFi technology the NSW Government will rely on the best practice specifications contained in the IEEE suite of standards (see Part 4). WiFi services advertised and sourced via the NSW ICT Service Catalogue must align with IEEE802.11n: Next generation Wireless LAN Technology at minimum, with the ability to transition to alignment with IEEE ac within a reasonable period. Public WiFi networks must align with the requirements of the IEEE u Protocol, or must have the capability of transitioning to alignment with IEEE u within a reasonable period. Ideally, public wireless service providers will be certified through the Wi-Fi Alliance s Wi-Fi Certified PassPoint. In addition, the following overarching principles apply to WiFi networks for use by NSW Government agencies: Mobile and flexible: The wireless network must support the modern business environment, including flexible work practices such as activity based working and hot desking. The service must support guest, public and private access, including access for BYOD devices. Vendor/ operating environment agnostic: The WiFi network should be accessible via a wide range of device and operating environment types. Devices such as laptops, mobile devices (including agency supplied and BYODs), printers, protectors, lighting systems, security cameras and IP telephony should be able to connect to, and access the network. The network should also be fully compatible with widely used operating environments. Fast: The WiFi service should be fast and should have the capability of maintaining fast speeds for a large number of users. As a general guide, the service should be capable of speeds aligning with IEEE802.11n at minimum. Reliable, scalable and dynamic: The wireless network must be reliable, scalable, and able to adapt to dynamic changes in traffic type and volume without causing disruptions to the user or server experience. Handover between access points should be seamless. Ideally, the service should incorporate the beamforming signal processing technique to improve performance, reliability and range. Supports applications and advanced functionality: The WiFi network should be able to support traditional data and multimedia applications such as Voice over IP (VOIP), videoconferencing and instant messaging. The WiFi network must also support advanced WiFi functionality such as specialist handling of voice, video, presence and printing from providers such as Apple, Cisco, Microsoft and IPFX. Authentication and access operation: The WiFi service should grant access to the network based on user and device identity, with reference to multiple MDM, LDAP and Network Management systems. Information capture and recording: The WiFi service must provide sufficient live information to enable diagnosis and to resolution of location, connection and performance issues. The WiFi service must also capture sufficient information for accurate, complete and fully auditable logs suitable for financial management and information security purposes. 5
7 4. STANDARD 4.1. Minimum requirements As outlined at Part 3, the NSW Government will rely on the best practice specifications contained in the IEEE suite of standards. Table 1 below summarises, at a high level, the expected technical features expected in a baseline and an ideal WiFi service: Table 1: Expected technical features Alignment with relevant IEEE standard QoS Access types Baseline Layer 1 Internet Layer 2 Data Layer 3 Real time VOIP and video Guest Private Public Mobile device support IOS Android Blackberry Window Verification (User) Local Back to home VoIP Video Broadcast Streaming Seamless handover between access points Encryption Beamforming Ideal Layer 1 Internet Layer 2 Layer 3 Data Layer 4 Voice Layer 5 - Video 4.2. Implementing a WiFi Service Agencies should align their WiFi service implementations with known best practice. Generally, implementation should incorporate the following processes: Service initiation Prepare the site survey and plan infrastructure, including connecting the relevant service provider and tenant carriage service to primary and secondary data centres. Review projected tenant requirements and prepare an initial and projected capacity plan setting out the expected traffic types, volumes, peak and off peak periods. Install and commission infrastructure and build documentation, including the connections between the service and existing tenant infrastructure. 6
8 4.2.2 Service Operation Apply ITIL Service Management practices and processes. These include: a 24 hour a day service desk facility; incident and problem management processes; capacity monitoring and management; and regular hardware and software maintenance. Authentication and access management o Apply the appropriate access policies to connections based on user and device identity. o Depending on the agency s requirements, public customers may be provided with guest access for public customers, while BYOD devices may be provided with restricted access and QoS. o Access to the network should be based on user and device identity, by reference to multiple MDM, LDAP and network management principles. Shared WiFi Service Operation: o Enable shared WiFi service operation through the provision of data services in line with the relevant service level agreement and capacity plan. o Where the agency has local infrastructure, provide access to local network resources, where the agency has local infrastructure. o Where the agency has no local infrastructure, provide a tunneled service back to the primary or secondary data centre. Real time operational data o Share real time operational data with the tenant s service desk to enable the tenant to identity users, connection times and types, authentication and the application of access policy. The data shared should include: Reporting user location information from a single list of users/devices traffic volume and throughput data by user and/or device user troubleshooting information (for example, log data). o Maintain, monitor and validate access log history for security reporting and remedial action. o Deliver reports that support accounting and chargeback by tenant, device type and user. o Support data accounting per application flow and/or user and device. 7
9 DOCUMENT CONTROL Document history Status: Final Version: 1.0 Approved by: Procurement and Technical Standards Working Group Approved on: 22 May 2014 Contact: John Thomas, Director, ICT Services, ICT Policy, Office of Finance and Services Telephone: (02) Review date This standard will be reviewed in 12 months. It may be reviewed earlier in response to post implementation feedback from Departments. 8
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au
More informationBring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
More informationNSW Government. End User Computing Standard. Version 1.0. October 2014
NSW Government End User Computing Standard Version 1.0 October 2014 standards@finance.nsw.gov.au ICT Services Office of Finance & Services Level 23, McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS
More informationNSW Government. Messaging, Collaboration and Unified Communications Standard. Version 1.0. October 2014
NSW Government Messaging, Collaboration and Unified Communications Standard Version 1.0 October 2014 standards@finance.nsw.gov.au ICT Services Office of Finance & Services Level 23, McKell Building 2-24
More informationNSW Government. Telecommunications: SIP (Session Initiation Protocol) Standard
NSW Government Telecommunications: SIP (Session Initiation Protocol) Standard October 2014 CONTENTS 1. Context 3 2. Required NSW Government business outcomes 3 3. Additional business outcomes for agency
More informationIncreased Productivity
OpenScape Mobile V7 OpenScape Mobile V7 is the next-generation mobile client of Unify for the latest mobile phones and tablets. It combines SIP-based VoIP, UC, and video features into one single application.
More informationICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT
POSITION: REPORTS TO: LOCATED: ICT Service Desk Team Leader ICT Services Design Manager Kings Way, South Melbourne DATE: March 2015 ORGANISATIONAL ENVIRONMENT Melbourne City Mission is a leader and innovator
More informationUNB s Mobility Strategy 2016 2017
UNB s Mobility Strategy 2016 2017 The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative mobile technologies that
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationNSW Government. Mobility Solutions Framework. Version 1.0
NSW Government Mobility Solutions Framework Version 1.0 NSW Government ICT Technical Standards Mobility Solutions Framework CONTENTS 1. CONTEXT 3 1.1. Background 3 1.2. Purpose 3 1.3. Scope and Application
More informationWelcome to the era of the anywhere worker
Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening
More informationBring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationNSW Government. Mobile Device & Application Framework. Version 1.0
NSW Government Mobile Device & Application Framework Version 1.0 standards@finance.nsw.gov.au ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 CONTENTS 1. CONTEXT
More informationBring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationWireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
More informationICT Category Sub Category Description Architecture and Design
A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking
More informationwww.quicknetworksolutions.net RC: 960240
QSL is a growing business that s offering IT Solutions and services to SME and Established Organizations with a high level of understanding and fully qualified, friendly and knowledgeable consultants.
More informationInnovation in Security. Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century
Innovation in Security Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century The complete Security Solution for SIP and Unified Communications designed
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationRemote Infrastructure Management Emergence of the Cloud-based Helpdesk
Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary
More informationOverview. Unified Communications
OpenScape Mobile V7 OpenScape Mobile is the next-generation mobile client of Unify, for the latest mobile phones and tablets. It combines SIP-based VoIP, UC and video features into one single application.
More informationComponents. Key features
BlackBerry Enterprise Service 10 What is it? BlackBerry Enterprise Service 10 helps you manage BlackBerry smartphones and BlackBerry PlayBook tablets, as well as ios devices and Android devices, all from
More informationUniversity of Strathclyde: Information Services Directorate Operational Plan for 2014/15
University of Strathclyde: Information Services Directorate Operational Plan for 2014/15 Enabling the future: transforming our information systems and technology 2014/15 2014/2015 CONTENTS 1 DRIVERS, STRATEGIC
More informationCounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.
CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationNSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
More informationIT Services. We re the IT in OrganIsaTion. Large Organisations
IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationSoftware-Defined Networking for Wi-Fi White Paper
Software-Defined Networking for Wi-Fi Introduction Software-Defined Networking for Wi-Fi The explosion in the number and diversity of wireless devices in today s enterprise networks has increased the pressure
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationLot 3 Service Specification MANAGED MOBILE SERVICE
Lot 3 Service Specification MANAGED MOBILE SERVICE Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED MOBILE SERVICE Fujitsu Managed Mobile is a global service providing lifecycle management services
More informationSecure Wireless Networking
Secure Wireless Networking In today s connected world, people expect seamless connectivity to their networks and the Internet. That s why Cisco Small Business Wireless s offer expanded range and coverage
More information[Type text] SERVICE CATALOGUE
[Type text] SERVICE CATALOGUE IT Services 1 IT Support and Management Services SERVICE AREA: SERVICE DESK Users can contact the Service Desk via the phone or an online web form for all their ICT service
More informationcollaboration Keeping people in touch efficiently
collaboration Keeping people in touch efficiently What is collaboration? At its best, unified communications (UC) is just what it says it enables better interaction between people by integrating what were
More informationNSW Government. Document Management Solutions Standard. v1.0. June 2015
NSW Government Document Management Solutions Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 standards@finance.nsw.gov.au CONTENTS 1.
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationUNIFIED COMMUNICATIONS. Keeping people in touch efficiently
UNIFIED COMMUNICATIONS Keeping people in touch efficiently WHAT ARE UNIFIED COMMUNICATIONS? At its best, unified communications (UC) is just what it says it enables better interaction between people by
More informationLTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
More informationDeveloping a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
More informationDeploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
More informationService Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e M o b i l e
More informationHow To Manage An 802.11 Wireless Network At A University
WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits
More informationEmpower the Workforce With BYOD and Collaboration 5 propose
Empower the Workforce with BYOD and Collaboration Cloud-Based Unified Communications Enhances BYOD Strategies January 2014 Prepared by: Zeus Kerravala Empower the Workforce with BYOD and Collaboration
More informationWHITE PAPER. Deploying Mobile Unified Communications for Avaya
WHITE PAPER Deploying Mobile Unified Communications for Avaya Table of Contents 1. Introduction...3 2. What are the drivers for deploying Mobile Unified Communications?... 3 3. What factors influence which
More informationHP Networking and Aastra
HP Networking and Aastra Solution whitepaper Table of contents Executive Summary... 2 Introduction... 3 HP Networking and Aastra: A true alliance... 4 Commitment to open standards... 4 Session Initiation
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationJob Description Information Services Coordinator
Job Description Position Title: Information Services Coordinator Department: Reports To: Technology & Infrastructure Manager Purpose The Information Services Coordinators role is to ensure the stability,
More informationHigher Education Solutions
Higher Education Solutions Higher education communications THE CHALLENGES Whilst IP Communications brings many advantages, the cost and complexity of moving users in a single step can be overwhelming.
More informationBT Hosted IPT (VoIP)
BT Hosted IPT (VoIP) What is Convergence? Currently, we see applications on distinct technologies Voice PBX / ISDN / PSTN Data LAN / WAN Video Dedicated VC link What is Convergence? Currently, we see applications
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationNOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
More informationICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
More informationHosted Desktop for Business
Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy
More informationLeveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage
Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where
More informationDesign and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
More information646-976. Cisco Data Center Network Solutions Sales Exam. http://www.examskey.com/646-976.html
Cisco 646-976 Cisco Data Center Network Solutions Sales Exam TYPE: DEMO http://www.examskey.com/646-976.html Examskey Cisco 646-976 exam demo product is here for you to test the quality of the product.
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
More informationSDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility
WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...
More informationSOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control
WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white
More informationeircom unified communications solutions giving your teams the power to deliver
eircom unified communications solutions giving your teams the power to deliver In a fast-moving world, information is power Business today moves fast: If your teams can t easily access the right resources
More informationICTTEN5204A Produce technical solutions from business specifications
ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationIT Enterprise Services
IT Enterprise Services Capita Virtual Workplace Agility & reliability for your future workplace Balancing freedom & control Virtual working is essential and you know the virtual workplace is possible.
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationIntroducing VEGA. www.vega-global.eu. Communications made easy. Video Communications. Skype For Business & Collaboration. Audio Visual Solutions
Introducing VEGA Video Communications Audio Visual Solutions Skype For Business & Collaboration Digital Media Communications Telephony & Voice Workspace Management www.vega-global.eu Communications made
More informationMobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector.
Mobile Device Management. Simplified centralised Mobile Device Management solutions for the UK education sector. Mobile Device Management. The use of mobile technology in the classroom has increased exponentially
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling
More informationSubtitle. VoIP Migration Strategy. Keys to a Successful Planning and Transition. VoIP Migration Strategy Compare Business Products 2014 1
Subtitle VoIP Migration Strategy Keys to a Successful Planning and Transition VoIP Migration Strategy Compare Business Products 2014 1 Contents Introduction... 3 VoIP Defined... 3 Why Are Businesses Opting
More informationChoose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
More informationBuilding the Lync Security Eco System in the Cloud Fact Sheet.
Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure and deliver a compliant cloud solution to all transactions in and out of the fastest growing Universal Communication
More informationWhat is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER
WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This
More informationMedical Grade Network Design and Operation
Medical Grade Network Design and Operation Chesapeake NetCraftsmen has been supporting our health care customers with designs and implementations of 'Medical Grade Networks'. In this whitepaper we will
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationRETAIL COMMUNICATIONS
RETAIL SOLUTIONS RETAIL solutions RETAIL COMMUNICATIONS THE CHALLENGES Your employees are busy serving in-store customers, the phones are ringing unanswered; will missed calls result in missed sales opportunities?
More informationWireless Network Standard
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
More informationMobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution
Solution Overview Mobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution Cisco Instant Connect: Time-Tested Interoperability Solution in the Public and Private Sectors Cisco
More informationMobility Challenge. Challenge #1: User Experience:
Mobility Challenge Challenge #1: User Experience: Explosion of wireless devices drives wireless access needs and issues Need for video support for distance learning, rich digital content and professional
More informationFlinders University. Telehealth in the Home. Video Strategy Discussion Paper. 2 October 2013
Flinders University Telehealth in the Home Video Strategy Discussion Paper 2 October 2013 Further information: Alan Taylor, Project Manager alan.taylor@flinders.edu.au Page 1 of 14 A AUTHORS A.1 Project
More informationElfiq Networks Vital for Hospitality
Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...
More informationSIMPLIFY YOUR BUSINESS COMMUNICATIONS
SIMPLIFY YOUR BUSINESS COMMUNICATIONS CONTENTS COMMUNICATIONS AS ONE 01 01 CAN HELP TRANSFORM YOUR BUSINESS 03 A SIMPLER EXPERIENCE 04 WHY CHOOSE OPTUS? 05 1 COMMUNICATIONS AS ONE Businesses today are
More informationDeploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
More informationMobilizing Business Applications, Efficiently and Affordably
VERIZON APPLICATIONS AND CLOUD Mobilizing Business Applications, Efficiently and Affordably Mobile connectivity has become a way of life and an expectation for much of today s workforce. With pervasive
More informationMobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
More informationBT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
More informationService Providers and WebRTC
Whitepaper Service Providers and WebRTC New Product Opportunities Over- the- Top (OTT) services are those that deliver communications features to customers but are apps running on the data network rather
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationThe CIO s Guide to Fixed Mobile Convergence
Executive Overview The CIO s Guide to Fixed Mobile Convergence Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending
More informationWLAN solutions to manage 1:1 and BYOD in K-12
MERU EDUCATION-GRADE SOLUTIONS FOR UNINTERRUPTED LEARNING SOLUTION BRIEF K-12 WLAN solutions to manage 1:1 and BYOD in K-12 BYOD Solutions for K-12/primary schools 1:1 computing where students are provided
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationApple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
More informationAC1750 Smart WiFi Router 802.11ac Dual Band Gigabit
Performance & Use AC1750 AC1750 WiFi 450+1300 Mbps speeds High-powered external antennas 1750 DUAL BAND 450+1300 RANGE Ideal for homes with 12 or more WiFi devices NETGEAR genie App Enjoy more of your
More informationVoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector.
VoIP Telephony for Schools. The deployment and ongoing support of VoIP solutions for the UK education sector. The future of voice communication for education. Together with our partners at New Star Networks,
More informationIT Managed Services Network services Collaboration
IT Managed Services Network services Collaboration aap 3 is one of the most professional companies that I have ever worked with. They have listened to our requirements and reacted with flexibility that
More informationWireless Networking Solutions for Schools. Assisting schools with the implementation of a trusted safe and secure wireless network.
Wireless Networking Solutions for Schools. Assisting schools with the implementation of a trusted safe and secure wireless network. Wireless networking for schools. As an accredited Ruckus Wireless Partner,
More informationUnderstanding the IEEE 802.11ac Wi Fi Standard Preparing for the next gen of WLAN
WHITEPAPER Understanding the IEEE 802.11ac Wi Fi Standard Preparing for the next gen of WLAN July 2013 Author: Richard Watson Contributors: Dennis Huang, Manish Rai Table of Contents Executive summary...
More informationThe evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
More information