Access "Four IT shops, four approaches to BYOD network security"
This article is part of the Feburary 2013 - Vol 4/ No.1 issue of BYOD challenges that lurk beyond network security
Devising a bring-your-own-device (BYOD) security plan would be simple if it merely involved granting network access based on user identity, device or location. But a solid BYOD network security application would consider all of these factors -- and that’s a tall order. At this point, since there is no proven singular solution, IT shops are instead patching together various tools that range from mobile device management (MDM) to network access control (NAC) and even out-of-band management systems. Executives at four educational institutions we interviewed for this piece would all like to control hundreds or even thousands of personal devices in an automated way so they aren’t burdened by installing software on each client. From there, they’d like to granularly control access depending on a combination of identity and device factors. But each executive is taking a different path to reach that goal. MDM Tools Are Promising, But Not A Total Solution All four executives interviewed were already using or evaluating MDM tools. These tools vary by feature depending ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
BYOD challenges that lurk beyond network security
by Shamus McGillicuddy
Everyone knows security tops the list of BYOD challenges, but network pros will face a slew of other headaches along the way.
-
Balancing wireless LAN troubleshooting strategies for BYOD
by Lisa A. Phifer
Security is only half the challenge when it comes to supporting a BYOD WLAN. The rest depends on WLAN troubleshooting to handle personal device drain.
-
BYOD challenges that lurk beyond network security
by Shamus McGillicuddy
-
-
Four IT shops, four approaches to BYOD network security
by David Geer
With no single solution for BYOD network security, engineers are getting crafty at integrating varied technologies to handle the challenge.
-
Four IT shops, four approaches to BYOD network security
by David Geer
-
Columns
-
In BYOD networking, no single solution
by Rivka Gewirtz Little, Executive Editor
Since there is no silver bullet for BYOD networking challenges, engineers need to get creative in technology integration … and then get management on board.
-
In BYOD networking, no single solution
by Rivka Gewirtz Little, Executive Editor
More Premium Content Accessible For Free
Hybrid Cloud networking falls short, but not for long
E-Zine
As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...
The new network: SDN gets real
E-Zine
As the software-defined networking (SDN) hype is replaced by real products, this edition of The New Network will look at the current state of SDN ...
Let the 40 Gigabit Ethernet migration begin
E-Zine
The need for capacity and speed explodes as network teams build private and hybrid clouds and deliver video throughout their campuses and branch ...