What happens when a user with an untrusted device tries to access my network?


Tiho Strabc, Wireless Specialist, Juniper Networks

From time to time we thought we could use this blog to post answers to questions submitted via our webinars. For starters please see below a response from Tiho Strabc, Wireless Specialist, Juniper Networks in answer to a question submitted via our latest webinar ‘BYOD & Mobile Threats – Is Your Network Simply Connected?’

What happens when a user with an untrusted device tries to access my network?

There are a few aspects to consider here: security, protection of the network and user experience. In short if a user tries to access a network that is simply connected with an untrusted device their access will be denied. However, what is equally important here is that this unauthorised access attempt is recorded and stored for any potential auditing purposes.  It’s important to assess what kind of access this is and also to review if anyone is continually trying to access the network illegally, as this may affect the bandwidth performance for authorised users. There should be counter measures in place to ensure bandwidth is not wasted and that continual unauthorised access attempts don’t affect the network experience for the rest of your wireless users.

For more please visit the recorded webinar here.

This entry was posted in Enterprise Posts, Service Provider and tagged , , , , by NetUtils. Bookmark the permalink.

About NetUtils

We operate as a specialist integrator of network, security and data solutions across the industry. Gathering together those with the skills and expertise to assess, champion and partner with the best innovation and technology available. Combining top tier solution providers and our own expert team we offer you decades of knowledge and experience in maximising your security investment. With our 25-year heritage comes over 450 years collective experience available to you in a million-pound team of industry leading specialists. By design we are structured to be guided by our technical arm, ensuring our core business is driven by solid technical policy. Working with over 400 enterprise and service provider clients, including household names across financial, education, public sector, manufacturing and healthcare brings a multitude of variance in challenge and opportunity. Our technology subject matter experts work with all our clients to meet their individual needs, both in the immediate and into the future for the threats yet to come.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s