Many IT organisations are focusing on managing their underlying wireless infrastructure - like Cisco and Aruba wireless LANs - while at the same time understanding who is using their wireless networks and for what purposes. Capabilities offered in this space range from live maps of controllers, LWAPs and user devices, to detection of rogue access points or reports on the encryption level and configuration of access points.
Some solutions can track user activity on wireless networks to the point of spookiness: They can track individual employees or visitors as they move around the building - how many meetings, where they took place, for how long - even where they had lunch. This is huge for security and legal issues, but also allows IT to have a complete picture of what departments and specific users are eating up bandwidth for work (and non-work related) tasks.
As the adoption of BYOD accelerates in Asia in 2013, it will be intriguing to see how IT plans are shifting because of this - and who is still ignoring it.
Ennio Carboni is president of Ipswitch's Network Management Division
Sign up for Computerworld eNewsletters.