Cloudpath Networks Intros Automated Device Enablement Framework

Cloudpath Networks has introduced the XpressConnect Enrollment System 3.0, an automated device enablement (ADE) platform that combines secure device onboarding and certificate management.

ADE provides infrastructure-based control and security for both personal and IT-owned devices without the need for on-device agents. Modeled after carrier networks, ADE uses smart, policy-associated certificates to provide visibility and control over every device starting at the WiFi layer and working upward. With the XpressConnect Enrollment System, enterprise environments can selectively enable services and capabilities on a device-by-device basis for a spectrum of users, including guests, contractors, BYOD and IT. IT can visually monitor devices and their associated policies in real time from a single dashboard.

The ADE framework is designed according to six key premises, according to the company:

  1. Every device should have secure, encrypted connectivity, even if that connectivity is Internet-only. A device without connectivity is worthless; a device with unencrypted access is dangerous; and a device with secure connectivity has value.
  2. WiFi is the new hub for the enterprise. Enterprises should handle guests, contractors, partners, suppliers, BYOD, IT and more in a consistent, secure and effective manner.
  3. The days of "one user equals one device" are over. Today's graduates (and tomorrow's employees) now regularly use four to five WiFi devices. With multiple devices, use patterns change. Environments should handle both low-value/low-risk devices and high-value/high-risk devices in a manner that efficiently captures the potential value from each device.
  4. Begin with least-privilege access and build upward. The highest volume of devices will need least-privilege (typically just Internet-only secure WiFi access). Be sure to tackle these in a cost-effective and user-friendly manner. As you move up the privilege ladder, ensure that the value of the additional privileges is greater than the associated costs (IT overhead, risk, user perception, etc.).
  5. Tread lightly on personal devices while maintaining security appropriate for the device's use. Infrastructure-based control helps maintain consistency across the fragmenting device landscape. Standards and existing protocols are preferable to proprietary agents and apps.
  6. Plan beyond the network. WiFi is the starting point for services, but devices commonly need access to other services, such as VPNs, web proxies, e-mail and websites (single sign-on or two-factor). Environments should ensure that each device is automatically enabled with the appropriate services and capabilities to match both IT policies and the device's intended use.

For more information visit the Cloudpath site.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • Analyst or Scientist uses a computer and dashboard for analysis of information on complex data sets on computer.

    Anthropic Study Tracks AI Adoption Across Countries, Industries

    Adoption of AI tools is growing quickly but remains uneven across countries and industries, with higher-income economies using them far more per person and companies favoring automated deployments over collaborative ones, according to a recent study released by Anthropic.

  • magnifying glass highlighting a human profile silhouette, set over a collage of framed icons including landscapes, charts, and education symbols

    AWS, DeepBrain AI Launch AI-Generated Multimedia Content Detector

    Amazon Web Services (AWS) and DeepBrain AI have introduced AI Detector, an enterprise-grade solution designed to identify and manage AI-generated content across multiple media types. The collaboration targets organizations in government, finance, media, law, and education sectors that need to validate content authenticity at scale.

  • Digital clouds with data points and network connections

    Microsoft Makes Windows 365 Cloud Apps Available for Public Preview

    Microsoft has announced that Windows 365 Cloud Apps are now available for public preview. This allows IT administrators to stream individual Windows applications from the cloud, removing the need to assign Cloud PCs to every user.

  • cloud with binary code and technology imagery

    Report: Hybrid and AI Expansion Outpacing Cloud Security

    A new survey from the Cloud Security Alliance (CSA) and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.