Pro+ Content/Network Evolution

Thank you for joining!
Access your Pro+ Content below.
April 2012 Vol. 3, No. 2

Mobile device security best practices for BYOD

Network managers are sweating the small stuff -- personal mobile devices like Kindles, iPads and Android products -- and with good reason. IT consumerization is introducing new security risks to the enterprise network, prompting managers to re-evaluate their organizations' existing mobile device security best practices. Seventy-one percent of enterprises believe that the use of personal mobile devices on their networks is leading to increased security incidents, according to a survey of 750 IT and security professionals. Sponsored by Check Point Software Technologies, the survey also revealed that 78% of respondents have seen the number of personal devices connecting to their networks more than double in two years. Network managers used to just block unwanted devices from accessing the network, but enterprises have begun embracing bring your own device (BYOD) policies, forcing a major shift in the way managers think about consumerization. Instead of first thinking, “Block access,” they are now thinking, “Enable access safely.” ...

Features in this issue

News in this issue

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

-ADS BY GOOGLE

Close