Secure Onboard

Control Your Connections with BYOD Made Simple

Your users have all sorts of shiny new personal devices. And they have high expectations about how easy it should be to use them on your network.

But traditionally, getting all those devices onboarded has been a huge headache for IT. How do you securely connect thousands of new user-owned devices without exposing your organization to new security threats? And how can you make the experience a good one, without asking people to re-enter logon credentials 10 times a day, or burying your helpdesk in password support tickets?

Ruckus has you covered with secure, no-hassle onboarding built for a bring-your-own-device (BYOD) world.

Hassle-Free Connectivity

Ruckus’ CloudPath Enrollment System makes BYOD simple, seamless and self-service. Use a single point of entry to onboard practically any user-owned device, for any BYOD scenario—employees, students, partners or guests. With certificate-based onboarding, secure access is linked to the device, not just a user account. So people can onboard once and then automatically reconnect in the future—without having to constantly re-enter credentials.

Stress-Free Security

BYOD shouldn’t mean “bring-your-own-security-vulnerabilities.” CloudPath ES brings scalable, standards-based security to any environment, using the gold standard for enterprise wireless encryption. Configure your policies for different types of users and devices, and CloudPath automatically provisions them, without any manual IT intervention. You can even onboard “headless” devices like gaming consoles, printers, and video cameras to your Smart Wi-Fi network just as easily and secure

Complaint-Free Administration

Thousands of different devices and platforms? No problem. Dozens of different use cases and policy profiles? Don’t worry about it. With Ruckus secure onboarding, it all happens automatically. And you can use it seamlessly within your existing Wi-Fi and security environment, at a fraction of the cost of expensive 802.1x authentication systems. No more trouble tickets for each new kind of device. No more password headaches for your users and your helpdesk. Instead, BYOD just works. And your IT team can focus their time and attention where it’s needed most.

Secure Guest Access

Security and Onboarding

What it means:

Secure guest access lets visitors use public Wi-Fi networks without compromising security for themselves or for the network.

Why you should care:

Public Wi-Fi hotspots are a great way to keep people in your venue longer and to improve guest satisfaction. But most of the time, public hotspots offer no security protection whatsoever, not even encryption. More and more users understand the security risk inherent to unprotected hotspots and, so, are more hesitant to use them. If they do, it’s likely to be only for a limited set of activities. This means you’re not getting all the direct or indirect revenues that motivated you to deploy public Wi-Fi in the first place.

Secure onboarding using Cloudpath software enables guests to securely and effortlessly connect to public hotspots. Guests onboard once and roam to any hotpot that is set up under the same roaming consortium. As soon as guests associate with the WLAN, they’re directed to a branded web portal, where they can choose secure or open access. With proprietary Automated Device Enablement (ADE), the device is secured in seconds.

Secure Device Onboarding and Cloudpath

Security and Onboarding

What it means:

It’s not 2005 anymore; there’s no reason that onboarding wireless devices shouldn’t be highly secure and simple. Ruckus Cloudpath software makes secure onboarding easy for enterprises, government agencies, and educational institutions.

Why you should care:

With billions of wireless devices and new ones hitting the market all the time, it can feel like the Wild West out there. Cloudpath lets you onboard both IT-owned and BYOD devices in a fast, automated way. Cloudpath invented self-service Wi-Fi onboarding in 2006, and onboards millions of devices each year. It uses standards-based security, strong encryption, and flexible policy controls to extend enterprise-grade security to every device coming onto your network.

Please wait...
Send a message

Sorry, we aren't online at the moment. Leave a message.

Your name
* Email
* Describe your issue
Login now

Need more help? Save time by starting your support request online.

Your name
* Email
* Describe your issue
We're online!

Help us help you better! Feel free to leave us any additional feedback.

How do you rate our support?