Accommodating guests without compromising security
Today’s organizations are scrambling to offer faster and more reliable guest access. The days of users tolerating no access or a poor experience are long gone.
What you’ll often find is an open network that allows users to connect by just selecting the appropriate guest SSID.
These guest networks are purposely kept simple to make things easy for the majority of non-technical users who want Internet access with their personally owned mobile devices. The downside is that these open networks usually lack encryption and required security measures to keep the network safe.
Requiring guests to configure their own devices for 802.1X and WPA2 enterprise encryption would be tantamount to climbing Mount Everest. A few could probably do it, but not many.
Unfortunately, convenience sometimes trumps security. But, as organizations slow down and revisit their guest access deployments they’re asking for advice. It’s really about how they can manage who gets access while still keeping it simple.
So what’s the solution? How can today’s enterprises accommodate guests (with the convenience that they expect without compromising security? Get the full story!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.