Premium Content

Access "Network security in a world of mobile workers"

Issue Overview

Network Evolution - April 2012 Vol. 3, No. 2

In this edition of Network Evolution E-zine, we explore how VDI is solving many bring-your-own-device (BYOD) challenges, and provide examples of how this strategy has seen success within industries including retail, healthcare and finance. Also inside: So-called "next-generation" firewalls are one of the past few year's most hyped technologies, but now they are also dominating the market, according to Gartner’s latest Magic Quadrant. Do they live up to the hype? Finally, get the inside scoop on mobile device security, and how to build the best policy so it doesn't compromise your users and increase network risks.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Is virtual desktop infrastructure the answer? by Nathan Eddy

      IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.

    • Networking for BYOD: No single solution by Rivka Gewirtz Little

      An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.

    • NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo

      Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.

    • Mobile device security best practices for BYOD by Lisa Sampson, Feature Writer

      BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."

More Premium Content Accessible For Free

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...

  • As users carry more devices, wireless network design must evolve
    network_evo_0614.png
    E-Zine

    The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...

  • Mobile devices are gobbling up your WLAN bandwidth: Here’s how to cope
    handle_mobile_device.png
    E-Handbook

    More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...