meru byod 2012 jul30
Post on 21-Oct-2014
738 views
DESCRIPTION
Simplify guest access and BYOD provisioning for any OS on any network!TRANSCRIPT
PROPRIETARY AND CONFIDENTIAL1
Meru Confidential
BYOD OVERVIEWBob Brezany– Territory Sales Manager
PROPRIETARY AND CONFIDENTIAL2
What if, your captive portal actually “captured” user information?
PROPRIETARY AND CONFIDENTIAL3
Welcome to ourguest hotspot!
Fully customize this page and add the components you want!
LoginCredit Card
Guest Self Registration
Password Change
PROPRIETARY AND CONFIDENTIAL4
And then provided credentials automatically and securely?
PROPRIETARY AND CONFIDENTIAL5
Send account information via
print-out, email, or SMS text message
PROPRIETARY AND CONFIDENTIAL6
And provided a complete audit of all activity?
PROPRIETARY AND CONFIDENTIAL7
> When they logged in
> Where they logged in
> The guests address
> What they did
> What was allowed
> What was disallowed
PROPRIETARY AND CONFIDENTIAL8
One policy for your entire network, wired and wireless
PROPRIETARY AND CONFIDENTIAL9
> Dynamically generate guest portal based upon your policy using:
Location IP Address Cookies HTTP HeaderLanguage Time of Day Web Browser GET ParameterDevice OS Mobile Device POST Parameter
PROPRIETARY AND CONFIDENTIAL10
With Identity Manager from Meru Networks, you can…
PROPRIETARY AND CONFIDENTIAL11
D
iver
sity
of
Dev
ices
Diversity of Users
Take Control
WLAN for Casual UseWLAN for Casual Use
Business Critical
Business Critical
> Employees use both Corporate and Personally Owned Devices
> As do• Guests• Contractors• Consultants
PROPRIETARY AND CONFIDENTIAL12
Automatically Provision Secure Network Access For Bring Your Own Device (BYOD)?
Control the device
PROPRIETARY AND CONFIDENTIAL13
Control user access
Automatically Provision the Right Policy for Each User
PROPRIETARY AND CONFIDENTIAL14
Simplify guest access and BYOD provisioning for any OS on any
network
PROPRIETARY AND CONFIDENTIAL15
With Meru Identity Manager for BYOD
> Easily create user accounts
> Automatically provide access credentials to your guests
> Give different levels of access based on policy
> Audit and Record everything that happens
> Meet your security requirements
> Maintain control
> You can:
PROPRIETARY AND CONFIDENTIAL16
Thank you!
Bob BrezanyTerritory Sales Manager, STL and Central IllinoisMeru Networks( Office: 314-313-3784( Mobile: 314-313-3784* Email: [email protected]