Premium Content

Access "BYOD challenges that lurk beyond network security"

Published: 23 Jan 2013

To many IT pros, bring your own device (BYOD) is an overused marketing term that should be put to rest. But there is no escaping the fact that droves of users are bringing their smartphones and tablets to work and causing BYOD challenges that fall right into the laps of network managers -- and the issues go well beyond security issues. BYOD challenge #1: Network security Security is clearly at the top of every list of BYOD challenges, and it's most often the factor preventing enterprises from adopting a BYOD strategy. The Wenatchee Valley Medical Center in Washington state, for example, has declined to embrace BYOD because of security concerns. Instead, the hospital system only allows smartphones that meet stringent security requirements to access email and calendar systems via McAfee's Enterprise Mobility Management product. "Protecting patient health information is a top priority, and consumer-grade devices have simply not evolved to the point where that information can be reasonably secured on any personal widget that comes through the door," said Don ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

  • Columns
    • In BYOD networking, no single solution by Rivka Gewirtz Little

      Since there is no silver bullet for BYOD networking challenges, engineers need to get creative in technology integration … and then get management on board.

More Premium Content Accessible For Free

  • How to manage and monitor the converged network

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...