Will your WLAN cope with the mobile era? Make sure you have the capacity and security to ride the wireless wave

Similar documents
Securing the network for BYOD. Computacenter and Cisco in partnership

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA

IBM AND COMPUTACENTER: POWERING AHEAD TOGETHER

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

MOBILITY: FROM NOVELTY TO COMMODITY HOW TO MAXIMISE THE BUSINESS VALUE OF MOBILITY IN FIVE EASY STEPS

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Cloud aggregation from Computacenter

Get more value from virtualisation

SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS

management solutions

An Optimal Opportunity. Mobile and Remote Working in Central and Local Government

TAP INTO THE FULL POTENTIAL OF MICROSOFT

Choosing the right solution for your Corporate

EMBRACE CHANGE Computacenter s Global Solutions Center helps organisations take the risk out of business transformation and IT innovation

Riding technology waves

Microsoft Lync and SharePoint: Increase productivity by connecting people and information

Secure Your Mobile Device Access with Cisco BYOD Solutions

The Citrix guide to desktop virtualisation

Enabling users with unified communications

Consumerization Survey Report The Consumerization of IT

MANAGING THE SOFTWARE PUBLISHER AUDIT PROCESS

Designing Mobile Apps: A Roadmap for Businesses

BT Business. Embracing the Bring Your Own Device revolution

COMPUTACENTER AND NETAPP: TRANSFORMING DATA CENTRES AS ONE

1 Executive Summary Document Structure Business Context... 6

Mobile measurement. Marketing that keeps pace with tablets and smartphones

Embracing Complete BYOD Security with MDM and NAC

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

ENHANCING RETAIL ENVIRONMENTS WITH THE ipad COMPUTACENTER AND APPLE TOGETHER

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Optus Future of Business Mobility Insights Paper Maximise the potential of your mobile workforce

Preparing your network for the mobile onslaught

Convergence. The Enabler of the Intelligent Building. Willie O Connell MD Northern Europe CommScope

HYBRID CLOUD SERVICES HYBRID CLOUD

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Wi-Fi Security. More Control, Less Complexity. Private Pre-Shared Key

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Managed Mobility Visibility and Network Infrastructure

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

ZyXEL adds wireless access and unified threat management to the curriculum at

A strategic approach to fraud

An Introduction to SIP

COMPUTACENTER S OPTIMISED DATA CENTRE MIGRATION APPROACH

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

A Bring-Your-Own-Device (BYOD) Solution Brief

Bring Your Own Device Mobile Security

Evolving your network for the BYOD Era

Is It Time To Refresh Your Wireless Infrastructure?

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring-Your-Own-Device Requires New Network Strategies

Data Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com

Performance from the Core

MAKING THE RIGHT CONNECTIONS

Bring Your Own Device (BYOD) and Mobile Device Management.

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device

Mobile Device Management Delivering control and security. Multinational Solutions

Keeping Data Safe When Using Mobile Devices

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Readiness Assessments: Vital to Secure Mobility

Strategic Road Map for Network Access Control

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Guardian365. Managed IT Support Services Suite

Monitoring & Measuring: Wi-Fi as a Service

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Kaspersky Security for Mobile

Feature BYOD - MOBILITY GOES VIRAL

From PC to Workplace. Productivity. Chris Ingle. Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved.

IT Enterprise Services

Seven Keys to Securing Your Growing Business

HP Security Solutions for Microsoft

Content Security: Protect Your Network with Five Must-Haves

2012 Endpoint Security Best Practices Survey

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Managed Networks. Fujitsu Safe, Reliable and Secure A trusted partner offering multi-operator network integration for a Hyperconnected World.

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Mobilize to Rightsize Your Network

The Hidden Dangers of Public WiFi

Securing and Monitoring BYOD Networks using NetFlow

How To Protect Your Network From Attack From A Network Security Threat

ENRICH, ENGAGE, ENTERTAIN 5 WAYS TO MAKE A BIGGER VISUAL IMPACT

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM.

Lucent VPN Firewall Security in x Wireless Networks

10 Threats to Successful. Enterprise Endpoint Backup

The Holistic Guide to BYOD in Your Business Jazib Frahim

Bring Your Own Device:

Transcription:

Will your WLAN cope with the mobile era? Make sure you have the capacity and security to ride the wireless wave

NEW RESEARCH REVEALS MORE USERS AND DEVICES ARE FLOODING THE CORPORATE WLAN THAN EVER BEFORE. ARE YOU SURE YOU HAVE SUFFICIENT CAPACITY AND SECURITY TO RIDE THE WIRELESS WAVE? Mobile working has gone mainstream. Goodbye desktop; hello laptop, smartphone and tablet. A new survey has revealed that enterprise IT departments are turning their back on the static PC in favour of mobile devices. Despite predictions that worldwide tablet shipments would increase by nearly 70 per cent in 2013, 1 it is the laptop that takes poll position in the enterprise IT stakes. According to the Computacenter research, 72 per cent of employees now work on company-owned laptops while only a third of users have been issued with corporate smartphones. The survey sounds the death knell for the domination of the desktop, with only 4 in 10 employees now using what was once the doyenne of workplace IT. By 2017, portable PC shipments are predicted to be double that of their static desktop counterparts. 2 More devices, more connectivity The ascendancy of mobile devices in the workplace has been accelerated by the BYOD phenomenon. Rather than wait to be issued with a company tablet or smartphone, employees simply took their personal devices to work. And there they ve stayed. According to the Computacenter survey, more than 60 per cent of employees now use personal tablets or smartphones in the workplace. Initially shunned by IT departments due to security risks and support challenges, BYOD is gaining greater corporate acceptance and being subjected to greater governance. The research reveals that 72 per cent of organisations have a policy for allowing the use of personal devices in the workplace. In 2012, only 61 per cent of companies had such a policy. 3 The amalgamation of personal and corporate devices in the workplace means that employees interact with a variety of different devices during the day both for personal and work purposes. For example, 85 per cent of employees use a laptop, 75 per cent use a smartphone and 47 per cent use a tablet or similar device. All of these devices need connectivity and not just during working hours. The Computacenter survey reveals that employees are just as active outside traditional office hours, with 77 per cent using personal and corporate devices after working hours.

The WLAN grows up The mobile revolution means a lot of the traffic from these devices is heading straight to the corporate WLAN - whether it is ready or not. Nearly 80 per cent of employees get their connectivity from the corporate Wi-Fi network. Most of today s WLANs were not designed for such intense levels of activity. Originally intended to provide Internet access for guests, WLANs were the side order for the main dish of the day: the LAN. As such they lack reliability, capacity and security. But in today s mobile-enabled workplace, the WLAN is fast becoming the most popular ingredient in the corporate networking menu. As Gartner confirms: The need for increased mobility within the enterprise, as well as the availability of connectivity outside the four walls through service provider Wi-Fi, means that wireless will be more than an overlay technology. 4 To ensure the WLAN can live up to its new role, organisations need to scale up and lock down their existing infrastructure. As Gartner observes: Today, the enterprise WLAN is typically limited to conference rooms and reception areas. To meet employees needs, intra-site Wi-Fi must extend across the entire site, thus becoming the primary method of connectivity at the LAN edge. 4 One of the most basic requirements for enabling wall-to-wall wireless connectivity is increased wireless access point coverage. Coverage requirements will be different for every organisation based on their mobility profile. To right-size wireless coverage based on current and future mobility requirements, organisations need to undertake a thorough assessment of their current infrastructure. This will help determine and prioritise WLAN optimisation and expansion initiatives. The need to ramp up corporate wireless capacity is leading to increased expenditure by IT departments. According to Gartner, WLAN continues to be the fastest-growing segment in the enterprise network equipment market. It predicts that end-user spending will double during the next five years, with a forecast CAGR of 15.7 per cent. 5 But a wireless everywhere approach doesn t have to result in more expense. According to Gartner, enterprises that deploy WLAN throughout the enterprise can eliminate running a cable to every office or cubicle. In greenfield installations, this can save as much as 30 per cent over an all-wired installation. 6 WLAN optimisation checklist Are you aware of the noise levels from conflicting devices on the same spectrum? Do you have an accurate graphical representation of wireless coverage across your estate? How much effort does it take to manage your wireless environment? Do you have a centralised visibility of both your wired and wireless environment from a single management pane? Can your infrastructure and management approach adapt as standards emerge and evolve? 3

Closing the security gap As well as investing in more capacity, organisations need to strengthen wireless security and not just at the infrastructure layer. Devices, data, applications and access points all need to be protected against the heightened security risks that come with greater mobility. A survey by security analyst Ponemon revealed that 80 per cent of organisations believe laptops and other mobile data bearing devices pose a significant enterprise security risk. 7 With wireless connectivity blurring where the corporate network starts and ends, organisations need to develop a security strategy that encompasses wired and wireless connectivity as well as mobile and fixed workplace devices. Establishing context-based security policies across the entire infrastructure will help strengthen access management for mobile users and devices. A more robust and intelligent approach to security is particularly key given the growing use of public Wi-Fi networks: Computacenter s research reveals that 35 per cent of corporate users connect via this method on a regular basis. To limit exposure to the worms and viruses that feed on public Wi-Fi, IT departments need to ensure all mobile devices employee and employer owned feature up-to-date firewall and anti-virus software. Providing VPN access will also ensure the encryption of corporate data while it traverses public networks. Encryption is increasingly being seen as an important weapon in the mobility security battle. A TechTarget survey revealed that 48 per cent of organisations planned to deploy laptop encryption in 2013 while 41 per cent planned to do the same for mobile devices. 8 Context-based security measures are also important, as they help to identify if a user and their device are genuine based on how, when and where they normally access the WLAN and the activities they engage in. Failure to take such additional security measures could not only expose the enterprise to damaging information breaches but also financial penalties. It s estimated that over the course of 12 months, a large enterprise can expect to rack up an average bill of $429,000 from mobility-related security issues. 9 More Information For more information please visit: www.computacenter.com/securitygap Computacenter: the wired and wireless experts Computacenter has a 30-year track record in networking, working with customers such as Morrisons and O2 We have a dedicated networking and security practice that helps customers understand the impact of new technologies and trends Computacenter offers an end-to-end service from sourcing and design to implementation and ongoing support We provide a range of assessments that enable customers to maximise their existing networking assets and make informed investment choices We have partnerships and accreditations with all the major networking vendors including Brocade, Cisco, F5 Networks and HP 4

Unlock the mobility advantage By getting wireless security and capacity right, organisations will be able to realise the full business benefits of greater mobility in the workplace - whether it s increased productivity or profitability. Those organisations leading the mobility charge, the innovators, have already seen their revenues grow by 44% For the traditionalists, this growth has been limited to 30% With results like these, mobility is no longer an option; it s an obligation. And so too is a robust and secure WLAN. Without an effective enterprise WLAN, there will be no mobile connectivity. Without an effective enterprise WLAN, there will be no mobile workforce. The WLAN is not just a network; it s a business enabler. And a game-changer. More Information For more information please visit our Networking pages at: www.computacenter.com/network 5

Sources 1 Gartner Press Release, http://www.gartner.com/newsroom/id/2408515 2 www.idc.com/getdoc.jsp?containerid=prus24129913 3 www.computacenter.com/news/generationz/ 4 Service Provider Wi-Fi Will Drive Changes in Enterprise Wireless LANs, Gartner, February 2013 5 Forecast Analysis: Enterprise Network Equipment, Worldwide, 1Q13 Update, Gartner, May 2013 6 2013 State of the Endpoint, Ponemon Institute, December 2012 7 http://searchsecurity.techtarget.com/feature/it-security-trends-2013-mobile-security-concerns-tops-the-list 8 Symantec State of Mobility 2012 9 Symantec State of Mobility 2013 Computacenter (UK) Ltd Hatfield Avenue Hatfield Hertfordshire AL10 9TW United Kingdom T: +44 (0)1707 631000 F: +44 (0)1707 639966 www.computacenter.com Computacenter is a leading independent provider of IT infrastructure services and solutions. From desktop to data centre, we help our customers minimise the cost and maximise the value of IT to their businesses. We can advise organisations on IT strategy, implement the most appropriate technology, optimise its performance, and manage elements of our customers infrastructures on their behalf. Computacenter operates in the UK, Germany, France and the Benelux countries, as well as providing transnational services across the globe. Computacenter 2014