Bring Your Own Device (BYOD) isn’t a trend anymore — it’s the new reality. Employees walk in with personal smartphones, tablets, and laptops and expect them to connect to the corporate network.
In 2011, IT teams face the challenge of enabling this convenience while maintaining control and security.
Corporate devices used to be the only ones on Wi-Fi. You could assume patch compliance, antivirus, and known configurations. That assumption is gone.
Now, unmanaged devices share the same airspace. And many of them are on your network.
Even if someone is a trusted employee, their phone or tablet isn’t. It hasn’t passed your policies. It might be jailbroken, misconfigured, or simply behind on patches.
Security starts with segmentation: - Separate BYOD traffic from corporate VLANs - Use WPA2-Enterprise with dynamic VLAN assignment if possible - Default to minimal access unless explicitly allowed
If BYOD demand grows, a third SSID for personal-but-internal use might be justified. But it must have: - Clear access rules (limited internal services, not full access) - 802.1X authentication - Firewalling or microsegmentation
More SSIDs mean more overhead — so weigh the benefits carefully.
Network Access Control (NAC) tools can assess device posture before granting access. While full NAC rollouts are still rare in 2011, forward-looking teams begin testing them in pilot environments.
Even simple checks — OS version, AV presence — add value.
BYOD users don’t think like IT. They assume “Wi-Fi is Wi-Fi.” Help them understand: - Why personal devices aren’t on the same VLAN - What apps or services are accessible - How to request access for specific tools
Clear documentation reduces tickets — and friction.
BYOD changes the game. Security policies must evolve. Segmentation becomes critical. And posture-aware access will eventually become the norm.
Start now. Small steps today prevent big problems tomorrow.
Tags: BYOD, Wireless Security, Policy Control
About the Author
Eduardo Wnorowski is a network infrastructure consultant and Director.
With over 16 years of experience in IT and consulting, he designs Wi-Fi environments that scale with modern demands for mobility, security, and visibility.
Connect on LinkedIn