Readers’ Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

Posted: December 28, 2012 in Readers' Poll
Tags: , , , , , ,

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s