Issue OverviewNetwork Evolution - April 2012 Vol. 3, No. 2
In this edition of Network Evolution E-zine, we explore how VDI is solving many bring-your-own-device (BYOD) challenges, and provide examples of how this strategy has seen success within industries including retail, healthcare and finance. Also inside: So-called "next-generation" firewalls are one of the past few year's most hyped technologies, but now they are also dominating the market, according to Gartner’s latest Magic Quadrant. Do they live up to the hype? Finally, get the inside scoop on mobile device security, and how to build the best policy so it doesn't compromise your users and increase network risks. Access >>>
Premium Content for Free.
Is virtual desktop infrastructure the answer?
by Nathan Eddy
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
Networking for BYOD: No single solution
by Rivka Gewirtz Little
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
- Is virtual desktop infrastructure the answer? by Nathan Eddy
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
Mobile device security best practices for BYOD
by Lisa Sampson, Feature Writer
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
- NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
A mobile device security strategy that puts users first
by Christina Torode, Editorial Director
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.
- Magic Quadrant: Next-generation firewalls are mainstream by Shamus McGillicuddy
More Premium Content Accessible For Free
How to manage and monitor the converged network
The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...
What does WebRTC video mean for the network?
WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...
Context makes network security policy smarter, but not easier
Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...