An assessment guide
With the rapid proliferation of personal smartphones, tablets and cloud applications, employees are accessing information over the corporate network in new ways. While this can lead to better business agility and productivity as employees discover innovative methods of meeting their work objectives, user experience can be severely impacted if your network is not equipped to manage the heightened demands of changing usage patterns. Your corporate environment can also be exposed to serious security threats if access is not adequately monitored. Your network plays a critical role in ensuring that employees can use the technology that enables them to be most productive. This resource is designed to help you evaluate the current state of your network, how it is serving your employees and what you can do to mitigate security risks. Note: this tool is intended to stimulate focused conversations about how your network is serving users. When you have completed this assessment, contact your Bell representative for information on a more thorough assessment and an implementation consultation, or have a representative contact you.
As more employees stream video, make calls and collaborate with colleagues using their own mobile devices, organizations need to ensure that their network is robust enough to handle the increased wireless activity and bandwidth demands. To get a clearer picture of what this bring your own device (or BYOD) trend looks like in your organization, consider the following questions.
1.1 Approximately how many employees access the network using a personal device on a daily basis?
5% or less 10% 25% 35% 50% or more We dont know
1.2 Along with devices, you also need to take application use into account because this too can significantly impact your network. What hosted or cloud applications are employees currently using?
Productivity software Project management Collaboration Sales Marketing Customer relationship management (CRM) Enterprise resource planning (ERP) HR Accounting or financial management Office management
2.3 What is the percentage of employees who watch webinars, demos or make video calls on a daily basis?
5% or less 10% 25% 35% 50% or more We dont know
2.4 Which of the following network service disruptions do employees experience during the work day?
Slow internet connection Dropped calls (voice or video) Difficulty connecting to the server Disrupted streaming
Understanding how your network is typically being used and any current evidence of instability provides indications as to how network infrastructure needs to be augmented or upgraded.
3.1 Which of the following devices are employees permitted to use in your organization?
Blackerry iPhone Android iPad Playbook All of the abovewe do not restrict the type of mobile devices employees use
3.4 What steps has IT taken to prevent employees from setting up smaller wireless networks on the organizations main corporate LAN?
Launched a company-wide awareness campaign Occasional in-person audits of departmental infrastructure and requirements are conducted Wireless intrusion detection to monitor access points and man-in-the-middle attacks has been deployed Wireless intrusion prevention to automatically address potential security risks has been deployed We have not yet taken specific steps
3.5 How do you secure your wireless LAN from threats such as hackers?
Role-based access policies and controls Wi-Fi Protected Access (WPA) The organization has Media Access Controls (MAC) on all authorized wireless network interface cards
3.7 Describe any processes your organization has in place to ensure its network remains compliant with industry security standards:
Talk to Bell
At Bell, we have the knowledge and expertise to help you create and implement a strong nextgeneration network that features fixed mobile convergence and unified communications capabilities. To learn more, contact your Bell representative or have a representative contact you.