BYO: for the safety of the company primarily

1:57 PM
BYO: for the safety of the company primarily -

BYO ... A nice acronym for a nice anglicism: Bring Your Own. In French in the text, CELA Designates use in professional Environnent personal materials. All What we say is great ... in Others. Whether because my company Not yet ripe pour Greet Personal Devices and Set place not Innovator program Who would frame the movement. In short, it is nice but not THIS Is for me ... Really?

Accompany Movement goes beyond the implementation of program place not allowing Coming WORK The user (without UO with against financial section) With One has not This ... thus ensuring June Better productivity of the company and facilitating the retention of talent SES device Who belongs.

BYO, it's more than that. The development initiative held in June BYO is essential to the security of the company . I'm Written indispensable. Just Because He Must Manage Power A security system information Extended Sie accept the unmanaged machines unmanageable OÜ CES.

Returning to Reality. 98% of respondents in 2011 Debut Companies For study commissioned by Citrix already acceptor recognize informally Way of devices they do not Gerent In Their OS ... Generally, CELA smartphones DAY Mainly (28 % of users contribute today Their phone) but also more and more Laptop Computers (38%) and New Devices like tablets (8% in strong growth)

Upon LORs iS security of the company is at risk. Comment Lutter? Prevent the use of such a device is build a Maginot Line in the business. Efficiency close to zero and a lot of energy expended ... In contrast, Take Account Devices PERSONAL IN UN framework BYO program, This ensure OF Having the offices Identification Devices capacity and eliminator non-means clustering of ensuring access and security of the information system. Let me explain.

Several existing technologies Who MAY be set place, sometimes combined Way, pour (re) securing the enterprise and its data.

  • network access control: this solution allows to control all of the company's network ports and allow access ou non. Unauthorized device will probably not end up on network says "quarantine" with a Limited Access. This solution seems attractive In order to prohibit access to devices not Geres But do not respond to the request A Safe Access SINCE THOSE Devices. The access is licensed Either ... Or Just Manichean banned and Sami Not really ensure that you Can I work with my device.
  • VPN pour everyone (... With the job analysis) :. solution to this is Interesting Several titles

1- a perspective of strategic car Përmet It refocus the non-fixed security perimeter, complete and immutable (the data center) Considering everyone as external and identifying Done natively All devices not owned by the company.

2- Non safety view points Utilizing post analysis and granular control, It Is able to adapt the access depending on the level of confidence connection pay stations Companies As for personal Post. Without granular control, this reference solution Users unsecure network not "quarantine" (see above). Granular control allows, unlike the network "Quarantine" to block ports CERTAIN Way Dynamic ensure not pay minimum level of secure access. Citrix solutions go UP able to identify the source (executable of the application signed with) pay guarantee That port can be used ONLY To open the desired application.

  • application virtualization and desktop virtualization: this solution transformer Provides Access method Doing so will enter the station on the network but not leaving a service under the administrator's control. Very schematically, instead of Access e Telles Telles resources, virtualization Përmet view my job the result of a non-Service (application e mail) Who is running in the secure data center and with my job Which has no direct communication (not just display). The question asks the OU Job Is That a security question (DOI I Access ONLY A single application) and ergonomics (DOI integrate myself ou non in the local office of the device and the effect AVOID " UN office in a office ").

Ideally, Should minimum power combiner VPN and desktop virtualization solution pour the June Having unique and it is this that provides Citrix with XenApp and XenDesktop Platinum ... All As External positions are considered and all must authenticate Near my business secure access. Depending on the security analysis result (Who? Where? What position? What level of confidence?) The solution dynamically Way Will not Let not exclusive Open VPN direct pour all or part of the network services, transformer Let l 'Access for all, e party applications.

WELL, I can guarantee That Will Work Users of any device and / ou anyone ... Never Endangering the Safety of my services and the MONITORING, access.

Why not LORs NE No formalize the arrival of exogenous CES New Devices? In launching the UN program BYO is the moyen de Resume hand over the security of the company ... and rescuer to secure his son business.

Previous
Next Post »
0 Komentar