Technology Blog

Guest Access – Convenience Seems to be the Battle Cry

by on ‎08-18-2015 05:51 AM - last edited on ‎12-30-2016 09:20 AM by

Accommodating guests without compromising security

 

Today’s organizations are scrambling to offer faster and more reliable guest access. The days of users tolerating no access or a poor experience are long gone.


Untitled.pngWhat you’ll often find is an open network that allows users to connect by just selecting the appropriate guest SSID.

 

These guest networks are purposely kept simple to make things easy for the majority of non-technical users who want Internet access with their personally owned mobile devices. The downside is that these open networks usually lack encryption and required security measures to keep the network safe.

 

Requiring guests to configure their own devices for 802.1X and WPA2 enterprise encryption would be tantamount to climbing Mount Everest. A few could probably do it, but not many.

 

Unfortunately, convenience sometimes trumps security. But, as organizations slow down and revisit their guest access deployments they’re asking for advice. It’s really about how they can manage who gets access while still keeping it simple.

 

So what’s the solution? How can today’s enterprises accommodate guests (with the convenience that they expect without compromising security? Get the full story!

Comments
Umesh

trent wrote:

Accommodating guests without compromising security

 

Today’s organizations are scrambling to offer faster and more reliable guest access. The days of users tolerating no access or a poor experience are long gone.


Untitled.pngWhat you’ll often find is an open network that allows users to connect by just selecting the appropriate guest SSID.

 

These guest networks are purposely kept simple to make things easy for the majority of non-technical users who want Internet access with their personally owned mobile devices. The downside is that these open networks usually lack encryption and required security measures to keep the network safe.

 

Requiring guests to configure their own devices for 802.1X and WPA2 enterprise encryption would be tantamount to climbing Mount Everest. A few could probably do it, but not many.

 

Unfortunately, convenience sometimes trumps security. But, as organizations slow down and revisit their guest access deployments they’re asking for advice. It’s really about how they can manage who gets access while still keeping it simple.

 

So what’s the solution? How can today’s enterprises accommodate guests (with the convenience that they expect without compromising security? Get the full story!



While on one side byod is a real security and management challenge ny to manage, slew of solutions like dlp, next gen utm devives and the cost and complexity attached to jt makes it a diffult proposition for end users. Considering these facts its diffi cult to find a value differentiator.

 

regards

umesh

www.techvichar.com

Hi Umesh,

 

Definitely, most management teams do not realize what is needed for a guest network. The only hear about performance issues, so that's the focus. Unfortunately, it'll probably take breaches for $ and time to be spent on shoring up guest networks. 

LeQuey Douglas

This is our current daily battle.  We desire a way to differentiate between true guest and employee/developers that need the access for testing purposes.

chui

Hmm interesting Topic performance is what the end user wants,where i work for example the guest WI-FI is so dang slow thats its a waste to even connect.The problem is some of the devices we use or work on are WI-FI only devices and no docks either so work becomes really slow.This has led to some dept to just get for example a Comcast line for greater performance.

Hi Chiu and Douglas,

 

I agree, the guest network is usually the most limited. The better way to have employees gain Internet access is to use Onboard or device registration and then use the Policy Manager to redirect those devices to Internet Only access (on the internal SSID). No sense in pushing people to the guest network like a lot of companies are doing....

 

Douglas, if empoyees use Onboard or registration you can use that context to keep them off of the Guest network.

 

chui

hmmm never used Onboard before,any Good?

Hi Chiu,

 

We have a lot of customers using Onboard. If you have the Policy Manager you can actually try it. If not, give your sales team a call.

 

Trent

 

chui
hmm I'm low in the food chain as an intern:)

Make something happen and maybe you go full-time!  8-)

Search Airheads
Showing results for 
Search instead for 
Did you mean: 
Announcements
Read all about it! If it’s happening now, it’s in the community.

Check out the latest blogs from your community team, the community experts and other industry sources.
Labels