Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

#GenMobile to infiltrate enterprises in AP: Aruba Networks

Nurdianah Md Nur | March 27, 2014
To enable #GenMobile to be productive, enterprises need to improve their Wi-Fi networks and automate their routine security network enhancement tasks.

"Wireless infrastructure is four times cheaper to install and three times cheaper to operate than a wired network," said Manav Khurana, vice president of Product Marketing at Aruba Networks. "Organisations that want to optimise their IT budget and spending should thus invest in wireless as it helps saves money while satisfying the needs of #GenMobile." As wireless networks require less ports, cooling and power, enterprises are also able to save on office space and utility costs, added Tay.

To support #GenMobile without compromising security, enterprises also need to be able to secure and configure mobile devices and apps. This is a challenge as "devices are refreshed more frequently" today  and "IT departments now need to support 10 to 20 times more apps than they had to," said Khurana. Enterprises thus need to look for solutions that enable "these routine security network enhancement tasks to be automated" or allow users to "provision their devices on their own and at their own time," claimed Tay. By doing so, IT departments do not need to spend too much time and effort configuring every device and users will be able to connect to the network easily and quickly.

Security policy
Only 55 percent of the respondents surveyed claimed that their companies had implemented security policies to manage the devices that were brought into the workplace. Many organisations are still struggling to create and enforce security policies as they are unsure of how to do so since the mobility trend has taken over the enterprise by storm, said Khurana.

"IT departments today need to have a three-part security policy consisting of corporate, mobile and guest devices," advised Khurana. "Corporate devices will have full access to the networks, mobile devices will have limited access while guest devices will only have access to the Internet." However, he asserted that the "only way to implement this policy is if the IT administrator has the visibility on all the different devices that exist" in the workplace. Khurana added: "Currently, most IT departments do not know if the user is connecting to the networks from a laptop, PC or smartphone so it is difficult for them to create the right policies."

"Ensuring that productivity and convenience are supplemented with solid technology choices that balance demand, experience and security is critical to building a sustainable business," said Tay.


Previous Page  1  2 

Sign up for Computerworld eNewsletters.