Issue OverviewNetwork Evolution - Feburary 2013 - Vol 4/ No.1
Every access network now must be engineered to enable, manage and secure BYOD. In this edition of Network Evolution, we offer insight into designing and securing the wireless LAN for BYOD. Access >>>
Premium Content for Free.
BYOD challenges that lurk beyond network security
by Shamus McGillicuddy
Everyone knows security tops the list of BYOD challenges, but network pros will face a slew of other headaches along the way.
Balancing wireless LAN troubleshooting strategies for BYOD
by Lisa A. Phifer
Security is only half the challenge when it comes to supporting a BYOD WLAN. The rest depends on WLAN troubleshooting to handle personal device drain.
- BYOD challenges that lurk beyond network security by Shamus McGillicuddy
Four IT shops, four approaches to BYOD network security
by David Geer
With no single solution for BYOD network security, engineers are getting crafty at integrating varied technologies to handle the challenge.
- Four IT shops, four approaches to BYOD network security by David Geer
In BYOD networking, no single solution
by Rivka Gewirtz Little
Since there is no silver bullet for BYOD networking challenges, engineers need to get creative in technology integration … and then get management on board.
- In BYOD networking, no single solution by Rivka Gewirtz Little
More Premium Content Accessible For Free
The cloud on the networking horizon
This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in ...
Discover the next generation of mobile application performance management
Traditional application performance management (APM) tools have given network managers little, if any, visibility into what causes performance ...
How to manage and monitor the converged network
The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...