Access your Pro+ Content below.
A mobile device security strategy that puts users first
This article is part of the April 2012 Vol. 3, No. 2 issue of Network Evolution
Mitch Davis knew the writing was on the wall -- or rather, the paper -- when he saw this headline in Bowdoin College's campus newspaper last year: "I don't do wired, I do wireless." As CIO at the Brunswick, Maine, college, he got the message: Its students operate in a wireless world. His concern, however, was about striking a balance between student demand for anytime, anywhere access and the need for mobile device security. The students get to live in their wireless world rather than having to live in our wired world. The college had a fiber optic network in place and Wi-Fi hotspots all over campus, but that setup wasn't enough. Bowdoin has a well-known museum and library and popular sporting events that attract thousands of visitors. Like the 1,750 students who attend the college, those visitors wanted wireless access on campus. A stadium full of soccer fans simultaneously trying to gain wireless access on campus made it clear that the Wi-Fi in place couldn't handle thousands of mobile users. To meet the rising demand for ...
Features in this issue
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
News in this issue
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.