Guard the Gate, Not The Endpoint to Adapt Your Network to BYOD Reality

Guard the Gate, Not The Endpoint to Adapt Your Network to BYOD Reality

BYOD is creating a debate in the IT industry, as enterprises scramble to manage the onslaught of employee-owned mobile devices and the challenges those devices create on their corporate networks.

Bandwidth and security are two primary areas of concern. The bandwidth strain from BYOD can be significant, and will only get worse as more employees rely on their employers’ wireless networks to access information and applications for business – and personal – activities.

In addition, Internet traffic from non-business related websites and apps can negatively impact an enterprise’s productivity, while service-affecting attacks from malicious code can jeopardize security and shut down a network.

Traditionally, with company-owned devices, IT departments could easily deploy and manage anti-virus software and other security measures. However, to solve the problems associated with numerous employee-owned devices, enterprises must shift their network and security control from the endpoint, or device level, to the gate, or network level.

Even with more devices on the network, most threats will still originate from external sources, so the corporate network needs a virtual barrier. This single, cloud-based control point should let IT dictate what applications and information are accessed by all devices, whether employee-owned or corporate assets, while helping enterprises efficiently manage and optimize their exiting bandwidth.

Network-based Internet security and content control systems present an ideal solution. Available now, these solutions should incorporate several primary features, including:

  • Granular control of Internet-based applications such as Facebook and YouTube
  • Bandwidth limits on allowed non-business applications without blocking those applications altogether
  • Usage limits and controls that vary by individuals and groups
  • Web security that proactively monitors Web content and blocks threats
  • A network-based firewall that eliminates the need for on-premise hardware and software investments.

IT departments can’t stop BYOD, nor should it try to, but with new tools like Masergy’s Intelligent Internet Management, they can control how their networks adapt to and control this new reality.

About Tim Naramore

Chief Technology Officer, Masergy
Tim Naramore is the Chief Technology Officer of Masergy Communications and brings more than 30 years of experience in IT and telecommunications to the discussion. Tim has worked at Frito-Lay, Texas Instruments, Boeing, Allegiance Telecom and Broadwing Communications on technologies ranging from IBM mainframes to handheld computers and web applications. Tim is responsible for the IT, Network Engineering and Software Engineering groups at Masergy. He holds a bachelor's of science in information systems from Pittsburg State University.

We've updated our privacy policy. We use cookies to improve the experience of our users, better understand how our website is used, and personalize advertising. By continuing to use this site you are giving us your consent to do this. You can read more and make cookie choices by visiting our privacy policy.