BYOD brings range into the enterprise mix: more devices deployed, more types of devices, a flood of consumer apps, and highly personal usage patterns. Managing this range does not mean locking down the device-side software, but rather establishing a trust-based model for controlling enterprise access. Good devices get services; bad devices don’t.
What is ‘good’? What is ‘bad’?
Sometimes it can be obvious, for example, if the operating system of the device has been compromised, current enterprise data should be wiped and access to enterprise terminated. However, most compliance issues are not quite this stark.
TCP Network Services needs effective assessment of posture to allow us to know the security and compliance state of the device. Our expert engineers then need the ability to tie this posture to mobile-specific policies and to existing corporate network enforcement policies.
TCP Network Services can make an intelligent decision about network admission and access control while managing and enforcing all settings and policies for apps and content on the mobile device.
Access control decisions are now timely and appropriate. Automated policy engines and human administrators both now have better visibility, which leads to better decisions.
TCP Network Services can ensure the policy infrastructure is invisible to the user. Users get all the enterprise apps and access they need to do their job as long as their device is trusted. If the trust is broken due to a compliance issue, data is not put at risk while the user remediates.