BYOD ready infrastructure Quick Start3
Our methodology has four stages:
This helps us understand your current environment,risks and needs. Then we can design and put inplace the best BYOD strategy for your organisation.
Our ten-module assessment
case for a BYOD infrastructure. Then we work through the
below, along with why they matter.
Module 1: Audit
have you put commercial, regulatory, business,technical, security and privacy controls and auditpoints in place?
do you have the right processes, tools and staff to
is it clear from your enterprise architecture whenyou should be measuring your BYOD infrastructureperformance?
Module 2: Network infrastructure
can your network infrastructure, administration andgovernance support and adapt to BYOD?
is your infrastructure’s capacity and performancesuitable for BYOD?
will the service offer value for money, with measurable
Module 3: Security infrastructure
does your infrastructure comply with data integrity andaccess policies?
are your users well trained on security processes andsign on?
does your BYOD functionality meet all your businessneeds? Has a risk assessment been performed for allyour user types and devices?
You’ve got to understand the assets, policies and
the long-term solution.
Your infrastructure is fundamental to performance.That’s why your network must be able to support all
If your security policy isn’t robust enough, anyone with
Architecture frameworkImplementation and integrationOptimisationAnalysis and strategy