This webinar was originally broadcast on:
Wednesday, October 30, 2013 11:00 AM EDT / 8:00 AM PDT
If you have previously registered for this event, please login here:

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Company Size*
Street Address 1*
Street Address 2
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
Please enable Cookies in your browser before registering for the webcast.
*Denotes required.
We have all heard a lot about Unified Access. The unspoken question is, can you afford to do it? And what are the implications to do the necessary changes?

In today’s new era of mobility, device and application freedom, networks are often not prepared to support the flexibility these technologies demand. Couple this with the IT team’s restricted budgets, the increased operational complexity, and the security threat exposure, and we are seeing a perfect storm brewing for today’s enterprise network.

With wireless use growing at double digit rates and wired access continuing to be a critical part of the enterprise infrastructure, users want the freedom and flexibility to be able to connect whether they are wired or wireless. Plus, as BYOD expands, network users want to be able to connect regardless of device type they are using. Wired and wireless have to coexist and to reach real user freedom we need to make sure all network services are seamlessly available on both networks. Users should be able to choose between corporate and personal devices and use either wired or wireless connections.

Wireless networks have greatly benefited from advances in security and technology but LANs have been left behind. How can you bring these typically siloed networks into one cohesive access network?

What attendees will learn:
  • The importance of having a Unified Access strategy, and the potential risks and benefits involved in transforming your network infrastructure to support this strategy
  • Important considerations in this transformation process:
    • Different network purchasing lifecycles, professional services expertise, end-to-end transformation potentially including WLAN, LAN access, LAN core and BYOD services
    • Security and operational considerations: Security on the LAN, minimizing operational tasks with BYOD services such as on-boarding, guest access, device posture, mix of personal and corporate applications
  • Best practices and recommendations that will protect your investment

Who should attend:
  • IT managers responsible for setting strategies, increasing mobility and adopting BYOD
  • CIOs looking to understand risk, benefits and a practical approach to IT Consumerization and BYOD


Andre Kindness
Senior Analyst Serving Infrastructure & Operations Professionals

Heitor Faroni
Director Solutions Marketing Network Business
Alcatel-Lucent Enterprise


Peter Bernstein
Senior Editor