Every quarter it seems there is a new buzzword, and, no matter where you play in the technology space, you can’t get away from hearing or seeing it. The buzzword that is top of mind for nearly everyone in this industry for the past few months is Bring Your Own Device (BYOD). And unlike “Convergence” or “Cloud”, BYOD has a very clear definition and is the most impactful to each of us on a daily basis.

IT managers across a variety of organizations are being asked to deal with this market trend and how they will address the BYOD “epidemic” in their organization. They may be thinking they are going to have to create a strategy from scratch or may be losing sleep because of how seemingly complex and cumbersome this will be on IT staff to draft and implement. If you (or a customer you know) is suffering from these symptoms and/or just can’t wrap your head around BYOD, Ruckus Wireless is here to help you solve your BYOD challenges, answer your BYOD questions, and create a strategy that will serve you now and into the future.  

So, here’s the first step to dealing with BYOD. Ask yourself, at the end of the day, what do enterprises really want? Our thoughts below.

  1. Find an easy way to onboard all devices (organization- and user-owned).
  2. Automatically provide user-based policies when a user connects.
  3. See who is accessing the network with which devices.
  4. Extend wired security and design (content filtering, firewalls, and VLANs) to the wireless network.
  5. Add wireless capacity to networks with 2x, 3x, or 4x devices per user.
  6. Keep it simple, cost-effective, and leverage existing infrastructure!

And above all, the absolutely most important thing for any type of business is that their wireless must work. No downtime, no exceptions.

To address BYOD and wireless reliability in general, Ruckus Wireless has a number of easy-to-implement features like Zero-IT Activation, Dynamic PSK, and simplified role-based access control. With these, enterprises can leverage their existing network resources to extend predefined policies to their wireless users and make connecting to the network as painless as possible.

What is a Dynamic PSK?

DPSKs (Dynamic Pre-Shared Keys) are a unique Ruckus feature for organizations that aren’t ready or don’t want to deal with 802.1X. A DPSK is a 62-byte key generated by the ZoneDirector. Each key is paired with a specific device, allowing the key/device/user combination to be managed and monitored individually.

  • Unique access credentials for each user and device
  • Individual control of user credentials (creating and revoking)
  • No certificates, complex configuration, or backend dependencies
  • Valid users can’t decrypt each other’s traffic

What is Zero-IT Activation?

Another unique feature from Ruckus that is often wed with DPSKs—or may be used with 802.1X – Zero-IT is a secure onboarding tool that allows users to self-provision devices without IT intervention. Users connect to a provisioning network, securely login with their domain credential (or against a Ruckus user database), and Zero-IT auto-configures their device with the appropriate network profile and its associated privileges. The device re-connects to the proper network and the user receives access, based on the role-based policies in place. IT stays out of the onboarding loop and yet they retain full control over the user/device access. They also have visibility to see who registered the device, what type of device it is, and plenty more.

Looking for more information on how Ruckus can ease your BYOD blues? Download the Ruckus BYOD Application Note or take a look at the below educational videos from Ruckus Wireless:

If you have any questions or would like more information please contact the Ruck Team @ ScanSource.  We are here to help!

This post was written by

Jake Shehan is a Merchandising Team Leader in the Security Business Unit of ScanSource Inc. He has over 8 years’ experience in channel sales mostly with the network video and WLAN segments of the market.

Learn more about this topic at scansourcecatalyst.com >Learn more about this topic at scansourcecommunications.com >Learn more about this topic at scansource.com >Learn more about this topic at scansourcesecurity.com >

Leave a Comment

Previous post:

Next post: