How User Management Can Save Your Guest Wireless Network

By Jonathan Wagstaffe - January 06, 2015


PV-blog-How-User-Management-Can-Save-Your-Guest-Wireless-NetworkAllowing guest users and new devices on your network is a little bit scary. Make that a bit closer to downright alarming. With threats lurking around every corner, it’s not surprising that security tops the list of concerns facing CIOs today. But we’re living in a world where connectivity is king, and not having a guest wireless network could quite possibly be a great detriment to your business.

So how do you juggle offering a no-fuss guest wireless experience with your need for a secure network? The answer is simple - manage your guests. Don’t just implement a security system that covers the basics, but look to sound guest management principles to curb security threats.

A good user management system can change your network’s risk profile, and certainly put to rest a lot of unnecessary stress.

Here Are Some Good Guest Management Strategies Not to Miss Out On

1. Create a policy that works for you and your guests

The importance of a great user policy is not to be understated. It’s the first step in defining how you expect users to behave on your guest wireless network, and outlines activities that won’t be tolerated. It also ensures that your users understand the legal implications of infringing on the policy rules, and sets the tone for overall network usage.

2. Implement a captive portal login

A captive portal, or “splash page”, is a great way to secure login to your guest network, and determine more information about your users. It redirects guests on your network to a designated URL, where they’re required to give a few details for authentication before being allowed to proceed to full access. It’s an opportunity to boost your brand, gather user information and check that connecting devices have appropriate anti-virus software.

3. Analyse your network’s traffic

Monitoring and analysing the traffic on your guest wireless network doesn’t only help you to check how your network is being used, it also gives you insight into the behaviour of your guest users, and the opportunity to improve their experience. It’s a window into your guest wireless network’s usage, and highlights how you can optimise bandwidth allocation, improve latency, identify risks and even intercept traffic. It also allows you to determine devices being used on your network.

4. Filter content

Implementing a filtering system that blocks your guest users from unsavoury sites can save your guest wireless network from security threats, or at least reduce the risk from a few obvious sources. These sites might be pornographic, or known spam-affiliated, or you can block video and media sites and those that allow peer to peer sharing.

5b7fba588d15906171e2d2ba_guest-wireless-network-min

Rolling out a Guest Wireless Network

The implementation of a successful guest wireless network takes careful planning. In this eBook we highlight the 4 key considerations before selecting a guest wireless network solution for your specific requirements.

Download Guide
Comments

We promise that we won't SPAM you.