欢迎来到天天文库
浏览记录
ID:34046189
大小:97.54 KB
页数:7页
时间:2019-03-03
《ets_mobile_iam-tracking_users_and_devices》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、MobileIAMTM–TrackingUsersandDevicesASolutionWhitePaperThereisnothingmoreimportantthanourcustomers.MobileIAMTM–TrackingUsersandDevicesProvidingVisibility,ControlandAutomationfortheMobileEnterpriseandBYODEnvironmentsIntroductionTheexplodingnumberandthediversityofendsystems
2、beingconnectedtotheirnetworksischallengingITdepartmentsinfourprimaryareas;security,compliance,applicationprovisioningandmanagement.NowherearethesechallengesmoreevidentthanintheBringYourOwnDevice(BYOD)environment.Thecombinationofhighspeedpervasiveaccessandthedesireofemplo
3、yeestousetheirowntablets,smartphonesandevenlaptopshavemadeimplementingandsupportingBYODamajorpainpointforITdepartments.Inordertocosteffectivelyprovidesecurity,compliance,applicationprovisioningandmanagementforBYODenvironmentsITdepartmentsneedasolutionthatcan:•Provideend-
4、to-endvisibilityfromthemobileedgeofthenetworktothedatacenter•Enableflexibleandpowerfulcontrolofresourcesthroughcontextbasedpolicymanagement•ProvideautomationtosimplifyonboardingmobiledevicesVisibilityInordertoensurenetworksecurityandmeetcompliancemandatestheITdepartmentm
5、ustbeabletoidentifyallofthedevicesconnectedtotheirnetwork.Theymustalsobeabletounderstandtherisksassociatedwithgrantingeachoftheendsystemsaccesstothenetwork.Asanexample,therisksassociatedwithanITmanageddesktopcomputerareobviouslyverydifferentthanthoseassociatedwithanemplo
6、yeeownedandprobablylargelyunmanagedtablet.ControlOncetheendsystemisdetected,identifiedandtheriskassessed,thepropercontrolsmustbeplacedontheaccess.Theaccesspolicyshouldbemoregranularthensimplygrantingallornothingaccesstothenetwork.Tosatisfysecurityandcompliancerequirement
7、sthepolicyshouldenforcetheprincipalofleastprivilege;giveusersaccesstoonlytheresourcesneededtodotheirjob.Thisisoftenreferredtoasrolebasedaccesscontrol.Forexample,aprofessorneedsaccesstotheserverholdingtheacademicrecordsbutastudentshouldnotbeabletoevensendpacketstothatserv
8、er.InanotherexampleanetworkengineerneedstouseprogramsthatuseICMPandSNMPprotocolsbutallotherusersshouldh
此文档下载收益归作者所有
点击更多查看相关文章~~