SlideShare una empresa de Scribd logo
1 de 16
BYOD OVERVIEW
                                   Bob Brezany– Territory Sales Manager
                                       rbrezany@merunetworks.com
                                              314.313.3784
1   PROPRIETARY AND CONFIDENTIAL
                                               Meru Confidential
What if, your captive portal actually
            “captured” user information?




2   PROPRIETARY AND CONFIDENTIAL
Login
Credit Card                                      Welcome to our
                                                 guest hotspot!


                                            Fully customize this page and add the
                Guest Self Registration
                                                    components you want!




 Password Change
   3 PROPRIETARY AND CONFIDENTIAL
And then provided credentials
                   automatically and securely?




4   PROPRIETARY AND CONFIDENTIAL
Send account
  information via
print-out, email, or
SMS text message




5   PROPRIETARY AND CONFIDENTIAL
And provided a complete audit of
                       all activity?




6   PROPRIETARY AND CONFIDENTIAL
> When they logged in
                                    > Where they logged in
                                    > The guests address




> What they did
> What was allowed
> What was disallowed

 7   PROPRIETARY AND CONFIDENTIAL
One policy for your entire network,
                  wired and wireless




8   PROPRIETARY AND CONFIDENTIAL
> Dynamically generate guest portal based upon your policy using:
         Location              IP Address    Cookies         HTTP Header
         Language              Time of Day   Web Browser     GET Parameter
         Device                OS            Mobile Device   POST Parameter




9     PROPRIETARY AND CONFIDENTIAL
With Identity Manager from Meru
                     Networks, you can…




10   PROPRIETARY AND CONFIDENTIAL
Take Control


> Employees use
  both Corporate                                                                        Business



                                    Diversity of Devices
  and Personally                                                                         Critical
  Owned Devices
> As do
       • Guests
       • Contractors                                        WLAN for
                                                           Casual Use
       • Consultants

                                                                   Diversity of Users



11   PROPRIETARY AND CONFIDENTIAL
Control the device




                                    Automatically Provision
                                    Secure Network Access
                                    For Bring Your Own
                                    Device (BYOD)?




12   PROPRIETARY AND CONFIDENTIAL
Control user access




                                    Automatically Provision
                                    the Right Policy for
                                    Each User




13   PROPRIETARY AND CONFIDENTIAL
Simplify guest access and BYOD
               provisioning for any OS on any
                          network




14   PROPRIETARY AND CONFIDENTIAL
With Meru Identity Manager for BYOD

> You can:
   > Easily create user accounts
      > Automatically provide access
        credentials to your guests
      > Give different levels of access
        based on policy
      > Audit and Record everything
        that happens
      > Meet your security
        requirements
      > Maintain control
 15   PROPRIETARY AND CONFIDENTIAL
Thank you!
                                    Bob Brezany
                                    Territory Sales Manager, STL and Central Illinois
                                    Meru Networks
                                    ( Office: 314-313-3784
                                    ( Mobile: 314-313-3784
                                    * Email: rbrezany@merunetworks.com




16   PROPRIETARY AND CONFIDENTIAL

Más contenido relacionado

Similar a Meru Byod 2012 Jul30

Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
802.11ac & byod linkdin
802.11ac & byod linkdin802.11ac & byod linkdin
802.11ac & byod linkdinEric Jorgensen
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012davesurreal
 
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management WebinarEliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management WebinarVeridium
 
Michael Eckersley Selected Work
Michael Eckersley Selected WorkMichael Eckersley Selected Work
Michael Eckersley Selected WorkHumanCentered
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCloudIDSummit
 
Identity systems
Identity systemsIdentity systems
Identity systemsJim Fenton
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Signify Overview
Signify OverviewSignify Overview
Signify Overviewkate_holden
 
Signify Overview
Signify OverviewSignify Overview
Signify Overviewpjpallen
 

Similar a Meru Byod 2012 Jul30 (20)

2012 ah apj deploying byod
2012 ah apj   deploying byod2012 ah apj   deploying byod
2012 ah apj deploying byod
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
802.11ac & byod linkdin
802.11ac & byod linkdin802.11ac & byod linkdin
802.11ac & byod linkdin
 
802.11ac Byod Linkdin
802.11ac Byod Linkdin802.11ac Byod Linkdin
802.11ac Byod Linkdin
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
2012 ah vegas deploying byod
2012 ah vegas   deploying byod2012 ah vegas   deploying byod
2012 ah vegas deploying byod
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012Bo d customer_presentation-q2-2012
Bo d customer_presentation-q2-2012
 
Eliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management WebinarEliminating Passwords with Biometrics for Identity Access Management Webinar
Eliminating Passwords with Biometrics for Identity Access Management Webinar
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Adaptive Trust Security
 
Michael Eckersley Selected Work
Michael Eckersley Selected WorkMichael Eckersley Selected Work
Michael Eckersley Selected Work
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul MadsenCIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
 
Identity systems
Identity systemsIdentity systems
Identity systems
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 
Signify Overview
Signify OverviewSignify Overview
Signify Overview
 

Meru Byod 2012 Jul30

  • 1. BYOD OVERVIEW Bob Brezany– Territory Sales Manager rbrezany@merunetworks.com 314.313.3784 1 PROPRIETARY AND CONFIDENTIAL Meru Confidential
  • 2. What if, your captive portal actually “captured” user information? 2 PROPRIETARY AND CONFIDENTIAL
  • 3. Login Credit Card Welcome to our guest hotspot! Fully customize this page and add the Guest Self Registration components you want! Password Change 3 PROPRIETARY AND CONFIDENTIAL
  • 4. And then provided credentials automatically and securely? 4 PROPRIETARY AND CONFIDENTIAL
  • 5. Send account information via print-out, email, or SMS text message 5 PROPRIETARY AND CONFIDENTIAL
  • 6. And provided a complete audit of all activity? 6 PROPRIETARY AND CONFIDENTIAL
  • 7. > When they logged in > Where they logged in > The guests address > What they did > What was allowed > What was disallowed 7 PROPRIETARY AND CONFIDENTIAL
  • 8. One policy for your entire network, wired and wireless 8 PROPRIETARY AND CONFIDENTIAL
  • 9. > Dynamically generate guest portal based upon your policy using: Location IP Address Cookies HTTP Header Language Time of Day Web Browser GET Parameter Device OS Mobile Device POST Parameter 9 PROPRIETARY AND CONFIDENTIAL
  • 10. With Identity Manager from Meru Networks, you can… 10 PROPRIETARY AND CONFIDENTIAL
  • 11. Take Control > Employees use both Corporate Business Diversity of Devices and Personally Critical Owned Devices > As do • Guests • Contractors WLAN for Casual Use • Consultants Diversity of Users 11 PROPRIETARY AND CONFIDENTIAL
  • 12. Control the device Automatically Provision Secure Network Access For Bring Your Own Device (BYOD)? 12 PROPRIETARY AND CONFIDENTIAL
  • 13. Control user access Automatically Provision the Right Policy for Each User 13 PROPRIETARY AND CONFIDENTIAL
  • 14. Simplify guest access and BYOD provisioning for any OS on any network 14 PROPRIETARY AND CONFIDENTIAL
  • 15. With Meru Identity Manager for BYOD > You can: > Easily create user accounts > Automatically provide access credentials to your guests > Give different levels of access based on policy > Audit and Record everything that happens > Meet your security requirements > Maintain control 15 PROPRIETARY AND CONFIDENTIAL
  • 16. Thank you! Bob Brezany Territory Sales Manager, STL and Central Illinois Meru Networks ( Office: 314-313-3784 ( Mobile: 314-313-3784 * Email: rbrezany@merunetworks.com 16 PROPRIETARY AND CONFIDENTIAL