Access "Networking for BYOD: No single solution"
This article is part of the April 2012 Vol. 3, No. 2 issue of Network security in a world of mobile workers
Leo Pickford, IT manager of ArchitecturePLB in London, learned two things about a bring your own device (BYOD) environment: first, there is no all-in-one technology solution; and second, allowing personal devices onto the corporate network boils down to mitigating risk. It’s not that there aren’t a plethora of BYOD technologies available. In fact, vendors push solutions that promise features ranging from mobile device management (MDM) to mobile network access control. But in most cases, these technologies address only portions of the overall picture. Specifically when it comes to networking for a BYOD environment, there are a myriad of challenges that include perimeter security, bandwidth management and application optimization. A real BYOD networking solution could require an infrastructure redesign to enable application- and user-aware access control and bandwidth management. For ArchitecturePLB, which has two offices and 60 employees, a complete network redesign is not an option. So Pickford has taken on one BYOD challenge at a time using a patchwork of ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Is virtual desktop infrastructure the answer?
by Nathan Eddy
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
-
Networking for BYOD: No single solution
by Rivka Little
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
-
Is virtual desktop infrastructure the answer?
by Nathan Eddy
-
-
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
-
Mobile device security best practices for BYOD
by Lisa Sampson, Feature Writer
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
-
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
-
News
-
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy, News Director
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
-
A mobile device security strategy that puts users first
by Christina Torode, Editorial Director
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.
-
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy, News Director
More Premium Content Accessible For Free
Hybrid Cloud networking falls short, but not for long
E-Zine
As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...
BYOD challenges that lurk beyond network security
E-Zine
Every access network now must be engineered to enable, manage and secure BYOD. In this edition of Network Evolution, we offer insight into ...
The new network: SDN gets real
E-Zine
As the software-defined networking (SDN) hype is replaced by real products, this edition of The New Network will look at the current state of SDN ...