Anda di halaman 1dari 5

Is your network ready to serve next-gen usage demands?

An assessment guide
With the rapid proliferation of personal smartphones, tablets and cloud applications, employees are accessing information over the corporate network in new ways. While this can lead to better business agility and productivity as employees discover innovative methods of meeting their work objectives, user experience can be severely impacted if your network is not equipped to manage the heightened demands of changing usage patterns. Your corporate environment can also be exposed to serious security threats if access is not adequately monitored. Your network plays a critical role in ensuring that employees can use the technology that enables them to be most productive. This resource is designed to help you evaluate the current state of your network, how it is serving your employees and what you can do to mitigate security risks. Note: this tool is intended to stimulate focused conversations about how your network is serving users. When you have completed this assessment, contact your Bell representative for information on a more thorough assessment and an implementation consultation, or have a representative contact you.

1.0 The people factor

As more employees stream video, make calls and collaborate with colleagues using their own mobile devices, organizations need to ensure that their network is robust enough to handle the increased wireless activity and bandwidth demands. To get a clearer picture of what this bring your own device (or BYOD) trend looks like in your organization, consider the following questions.

1.1 Approximately how many employees access the network using a personal device on a daily basis?
5% or less 10% 25% 35% 50% or more We dont know

1.2 Along with devices, you also need to take application use into account because this too can significantly impact your network. What hosted or cloud applications are employees currently using?
Productivity software Project management Collaboration Sales Marketing Customer relationship management (CRM) Enterprise resource planning (ERP) HR Accounting or financial management Office management

1.3 How often do employees use video conferencing?


On a regular basis Once in a while We dont have video conferencing capabilities Along with mobile devices and video, the use of cloud-based and virtual in-client applications will continue to grow. As a result, even more strain will likely be added to existing networks.

2.0 Your current network


Existing legacy networks were designed well before single platform devices came into play. Current IP networks typically do not have the wireless capabilities needed to effectively manage these clients and applications.

2.1 How old is your existing wireless network?


Five years old Ten years old Over 15 years old I dont know

2.2 How do employees access the organizations existing IP network?


Via Cat 5 or Cat 6 cabling Via wireless LAN Bothemployees switch back and forth as needed

2.3 What is the percentage of employees who watch webinars, demos or make video calls on a daily basis?
5% or less 10% 25% 35% 50% or more We dont know

2.4 Which of the following network service disruptions do employees experience during the work day?
Slow internet connection Dropped calls (voice or video) Difficulty connecting to the server Disrupted streaming

Understanding how your network is typically being used and any current evidence of instability provides indications as to how network infrastructure needs to be augmented or upgraded.

3.0 Securing your network


Wireless access points, by nature, make it difficult for administrators to monitor network activity. This makes restricting device use and access a critical tool for mitigating security risks. Here are some things to think about in terms of security:

3.1 Which of the following devices are employees permitted to use in your organization?
Blackerry iPhone Android iPad Playbook All of the abovewe do not restrict the type of mobile devices employees use

3.2 Who has access to corporate applications on personal mobile devices?


Executives Guests (clients or partners) Managers Sales people Everyone Other: __________________________________

3.3 How is employee activity on the network monitored?


Content is restricted Only certain applications can be accessed We use third-party network monitoring tools

3.4 What steps has IT taken to prevent employees from setting up smaller wireless networks on the organizations main corporate LAN?
Launched a company-wide awareness campaign Occasional in-person audits of departmental infrastructure and requirements are conducted Wireless intrusion detection to monitor access points and man-in-the-middle attacks has been deployed Wireless intrusion prevention to automatically address potential security risks has been deployed We have not yet taken specific steps

3.5 How do you secure your wireless LAN from threats such as hackers?
Role-based access policies and controls Wi-Fi Protected Access (WPA) The organization has Media Access Controls (MAC) on all authorized wireless network interface cards

3.6 How often do you update your VPN software?


Every six months On an annual basis Every 2-5 years We have not yet updated

3.7 Describe any processes your organization has in place to ensure its network remains compliant with industry security standards:

Things to keep in mind:


Governance is key
Organizations can be exposed to serious risk if there is unrestricted access to the corporate network from mobile devices, as many consumer-grade smartphones and tablets do not come equipped with enterprise-level security protection. It is imperative that organizations outline governance rules and regulations in an official policy, and focus on securing the data in addition to implementing advanced network controls.

Meeting the demand: Next-generation networks


The demand for a robust wireless network will only continue to grow as mobile devices, cloud applications and video technologies continue to advance. Industry experts predict that existing IP networks could become obsolete in as little as five to eight years. It is critical, then, that organizations take proactive steps towards building a high-powered, WiFi LAN network that seamlessly integrates your IP, 3G mobile and wireless systems to meet growing usage demands. The resulting optimized next-generation network vastly improves user experience, mitigates security threats and eliminates the need for specialized video equipment and networks.

Talk to Bell
At Bell, we have the knowledge and expertise to help you create and implement a strong nextgeneration network that features fixed mobile convergence and unified communications capabilities. To learn more, contact your Bell representative or have a representative contact you.

Anda mungkin juga menyukai