Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
1Activity
×
0 of .
Results for:
No results containing your search query
P. 1
BT Advise BYOD Ready Infrastructure Quick Start Brochure

BT Advise BYOD Ready Infrastructure Quick Start Brochure

Ratings: (0)|Views: 104|Likes:
Published by BT Let's Talk
If you want to adopt a bring-your-own-
device (BYOD) policy without
putting your business at risk, you've
got to take a strategic approach.
If you want to adopt a bring-your-own-
device (BYOD) policy without
putting your business at risk, you've
got to take a strategic approach.

More info:

Published by: BT Let's Talk on Oct 14, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

04/01/2014

pdf

text

original

 
BYOD ready infrastructure Quick Start3
Our methodology
Our methodology has four stages:
 This helps us understand your current environment,risks and needs. Then we can design and put inplace the best BYOD strategy for your organisation.
Our ten-module assessment

case for a BYOD infrastructure. Then we work through the

below, along with why they matter.
Module 1: Audit

have you put commercial, regulatory, business,technical, security and privacy controls and auditpoints in place?

do you have the right processes, tools and staff to

is it clear from your enterprise architecture whenyou should be measuring your BYOD infrastructureperformance?
Module 2: Network infrastructure

can your network infrastructure, administration andgovernance support and adapt to BYOD?

is your infrastructure’s capacity and performancesuitable for BYOD?

will the service offer value for money, with measurable

Module 3: Security infrastructure

does your infrastructure comply with data integrity andaccess policies?

are your users well trained on security processes andsign on?

does your BYOD functionality meet all your businessneeds? Has a risk assessment been performed for allyour user types and devices?

You’ve got to understand the assets, policies and

the long-term solution.

Your infrastructure is fundamental to performance.That’s why your network must be able to support all


If your security policy isn’t robust enough, anyone with

Architecture frameworkImplementation and integrationOptimisationAnalysis and strategy

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->