With BYOD, you have to secure the IT network directly at the gate
Students, employees and visitors – anyone at Delft University of Technology (TU Delft) can use their laptops, tablets, or smartphone to access the IT network. Bring Your Own Device (BYOD) is one of the university’s main aims, as long as it is done securely and transparently. IT operations manager Gino van der Velden chose the Tesorion Immunity network security solution to make this possible.
Gino van der Velden, Manager IT Operations bij TU Delft
“We had a dream, and it was called BYOD,” explains Van der Velden.
A few years ago, it was decided to use Tesorion Immunity. This network security application recognises which user is joining the network and the device they are using and, according to the configuration, grants (or does not grant) access rights to particular network locations, applications, and sources. “The solution was the only one that offered a flexible and transparent solution for doing this.” Van der Velden’s team uses Tesorion Immunity to make Flexnet possible. Together with people from Tesorion, the tool was introduced for every TU Delft location.
”This concerns around 50,000 IP addresses and more than 65,000 wall outlets. “We deliberately opted for a longer implementation period in order to keep customer satisfaction high. Many users will not even have noticed the Tesorion Immunity implementation.”
End-users should have a smooth experience. We don’t want anyone forced to install anything on their device.
Also, we get far fewer requests or complaints to deal with. All of this reduces the burden on administrators.
A very warm reception
What many users did notice was the launch of TU Visitor, part of Flexnet that TU Delft’s guests can use to gain internet access. It received a very warm reception, recalls Van der Velden. It was the first time that employees could give their guests direct access to the network with a password without the need to involve network administrators. Previously, they had had to request log-in information, much to their frustration.
The solution was the only one that offered a flexible and transparent solution for doing this.
Easy for administrators
As well as better network security for the university and the IT organisation, Tesorion Immunity has also made life a lot easier for administrators. Van der Velden gives the example of network administrators in the past having to do the switching manually every time a device or an employee relocated. “With the new application, it is a matter of registering the device or user in Tesorion Immunity just once. You never have to change it after that. Also, we get far fewer requests or complaints to deal with. All of this reduces the burden on administrators.”
Van der Velden has nothing but praise for the university’s partnership with Tesorion. “We already knew the company; they had previously installed detection and isolation technology here. They are highly professional in everything they do, so it’s a pleasure to work in partnership with them. And they always keep their promises. “If there’s something they can’t supply, they tell you openly and honestly.” Partners and end-users alike benefit from Tesorion Immunity’s principles of clarity and transparency.