Access "Mobile device security best practices for BYOD"
This article is part of the April 2012 Vol. 3, No. 2 issue of Network security in a world of mobile workers
Network managers are sweating the small stuff -- personal mobile devices like Kindles, iPads and Android products -- and with good reason. IT consumerization is introducing new security risks to the enterprise network, prompting managers to re-evaluate their organizations' existing mobile device security best practices. Seventy-one percent of enterprises believe that the use of personal mobile devices on their networks is leading to increased security incidents, according to a survey of 750 IT and security professionals. Sponsored by Check Point Software Technologies, the survey also revealed that 78% of respondents have seen the number of personal devices connecting to their networks more than double in two years. Network managers used to just block unwanted devices from accessing the network, but enterprises have begun embracing bring your own device (BYOD) policies, forcing a major shift in the way managers think about consumerization. Instead of first thinking, “Block access,” they are now thinking, “Enable access safely.” It's a new mindset for ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Is virtual desktop infrastructure the answer?
by Nathan Eddy
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
-
Networking for BYOD: No single solution
by Rivka Little
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
-
Is virtual desktop infrastructure the answer?
by Nathan Eddy
-
-
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
-
Mobile device security best practices for BYOD
by Lisa Sampson, Feature Writer
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
-
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
-
News
-
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy, News Director
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
-
A mobile device security strategy that puts users first
by Christina Torode, Editorial Director
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.
-
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy, News Director
More Premium Content Accessible For Free
Harvesting business intelligence with network monitoring tools
E-Zine
Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. ...
WAN optimization policy goes deep
E-Zine
The nature of the branch office is changing. Previously, branch offices were small remote sites with groups of workers that had a single focus, such ...
Hybrid Cloud networking falls short, but not for long
E-Zine
As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...