Integrated NAC, MDM and BYOD monitoring SM beyond : (secured and monitored BYOD environment)

Date of Publication


Document Type

Bachelor's Thesis

Degree Name

Bachelor of Science in Computer Science

Subject Categories

Computer Sciences | Information Security | OS and Networks


College of Computer Studies


Computer Science

Thesis Adviser

Arlyn L. Ong

Defense Panel Chair

Jocelyn Cu

Defense Panel Member

Geanne Franco
Katrina Solomon


The idea of introducing bring your own device to organizations (BYOD) is to allow employees of bringing and using their own computing device such as smartphones and tables to use enterprise applications and access data. The introduction of BYOD practice has been widely supported because it save costs, increase productivity and satisfies employees. However, it has brought a significant change in the field of securing and managing the organization's networks. Companies have to be wary of the threats such as security issues malwares, and bandwidth issues brought by the introduction of BYOD. Additionally, majority of the organizations do not enforce security policies. The study's proposed solution is an integrated NAC, MDM, BYOD monitoring, and automated response system that will greatly improve the security of the BYOD environment. NAC, MDM, and the response system provide an active way to secure the network while mobile monitoring provides a passive way of securing the network by monitoring, and logging all connected devices. With NAC present in the network, it is possible to authenticate users upon connecting to the network. After authenticating the users, MDM enforces security policies in order to secure the devices and the network together. With the availability of a secured NAC and MDM network, monitoring with automatic responses to violators is the next solution in order to see if the policies pushed by the MDM are enforced. Monitoring acts as another layer of security to the organization, as it tracks the enforcement of the MDM. While the response system provides a way to punish users who are deemed suspicious because of their violations towards the policies of the company. This study uses De La Salle University Manila as its test case for an enterprise system. It will adapt De La Salle University Manila's policies as guidelines for the implementation of policies whose goals are to secure and monitor the BYOD environment.

Abstract Format






Accession Number


Shelf Location

Archives, The Learning Commons, 12F, Henry Sy Sr. Hall

Physical Description

1 volume (various foliations): illustrations (some color); 28 cm.


Computer security; Computer networks -- Security measures

This document is currently not available here.