Meru Byod 2012 Jul30

16
PROPRIETARY AND CONFIDENTIAL 1 Meru Confidential BYOD OVERVIEW Bob Brezany– Territory Sales Manager [email protected] 314.313.3784
  • date post

    21-Oct-2014
  • Category

    Documents

  • view

    738
  • download

    0

description

Simplify guest access and BYOD provisioning for any OS on any network!

Transcript of Meru Byod 2012 Jul30

Page 1: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL1

Meru Confidential

BYOD OVERVIEWBob Brezany– Territory Sales Manager

[email protected]

Page 2: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL2

What if, your captive portal actually “captured” user information?

Page 3: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL3

Welcome to ourguest hotspot!

Fully customize this page and add the components you want!

LoginCredit Card

Guest Self Registration

Password Change

Page 4: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL4

And then provided credentials automatically and securely?

Page 5: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL5

Send account information via

print-out, email, or SMS text message

Page 6: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL6

And provided a complete audit of all activity?

Page 7: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL7

> When they logged in

> Where they logged in

> The guests address

> What they did

> What was allowed

> What was disallowed

Page 8: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL8

One policy for your entire network, wired and wireless

Page 9: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL9

> Dynamically generate guest portal based upon your policy using:

Location IP Address Cookies HTTP HeaderLanguage Time of Day Web Browser GET ParameterDevice OS Mobile Device POST Parameter

Page 10: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL10

With Identity Manager from Meru Networks, you can…

Page 11: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL11

D

iver

sity

of

Dev

ices

Diversity of Users

Take Control

WLAN for Casual UseWLAN for Casual Use

Business Critical

Business Critical

> Employees use both Corporate and Personally Owned Devices

> As do• Guests• Contractors• Consultants

Page 12: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL12

Automatically Provision Secure Network Access For Bring Your Own Device (BYOD)?

Control the device

Page 13: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL13

Control user access

Automatically Provision the Right Policy for Each User

Page 14: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL14

Simplify guest access and BYOD provisioning for any OS on any

network

Page 15: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL15

With Meru Identity Manager for BYOD

> Easily create user accounts

> Automatically provide access credentials to your guests

> Give different levels of access based on policy

> Audit and Record everything that happens

> Meet your security requirements

> Maintain control

> You can:

Page 16: Meru Byod 2012 Jul30

PROPRIETARY AND CONFIDENTIAL16

Thank you!

Bob BrezanyTerritory Sales Manager, STL and Central IllinoisMeru Networks( Office: 314-313-3784( Mobile: 314-313-3784* Email: [email protected]