Premium Content

Access "Four IT shops, four approaches to BYOD network security"

David Geer Published: 23 Jan 2013

Devising a bring-your-own-device (BYOD) security plan would be simple if it merely involved granting network access based on user identity, device or location. But a solid BYOD network security application would consider all of these factors -- and that’s a tall order. At this point, since there is no proven singular solution, IT shops are instead patching together various tools that range from mobile device management (MDM) to network access control (NAC) and even out-of-band management systems. Executives at four educational institutions we interviewed for this piece would all like to control hundreds or even thousands of personal devices in an automated way so they aren’t burdened by installing software on each client. From there, they’d like to granularly control access depending on a combination of identity and device factors. But each executive is taking a different path to reach that goal. MDM Tools Are Promising, But Not A Total Solution All four executives interviewed were already using or evaluating MDM tools. These tools vary by feature depending ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
  • Columns
    • In BYOD networking, no single solution by Rivka Gewirtz Little, Executive Editor

      Since there is no silver bullet for BYOD networking challenges, engineers need to get creative in technology integration … and then get management on board.

More Premium Content Accessible For Free

  • Harvesting business intelligence with network monitoring tools
    network_evolution_august_2013.png
    E-Zine

    Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. ...

  • WAN optimization policy goes deep
    sNetworking_Network_evolution_june_2013.png
    E-Zine

    The nature of the branch office is changing. Previously, branch offices were small remote sites with groups of workers that had a single focus, such ...

  • Hybrid Cloud networking falls short, but not for long
    evolution_cover_april_2013_landscape.PNG
    E-Zine

    As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...