2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments.
Posts Tagged ‘Network Security’
Tags: BYOD, malware, Microsoft DirectAccess, Network Security, remote access, trojans, VPN
Tags: Android, BYOD, employee security, IT security, mobile, mobile devices, Network Security
Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain Vulnerabilities
Midsize Insider – IT Security Threats: The Predictive Problem
SearchCloudApplications – Mobile cloud trends: Apps let enterprises handle the risks of cloud computing
TabTimes – Study: Forget corporate deployments, BYOD will drive business adoption of Windows 8 tablets
Tags: employee security, Joe the CIO, Network Security, remote access, TCOS, technology purchasing, total cost of ownership, video, VPN
Today, we join Joe the CIO as he ponders technology investment costs. In particular, Joe can’t help but wonder if there are some expenses related to a recent remote access project that he overlooked — or worse, ignored. This predicament might sound familiar to anyone who oversees technology purchasing. In fact, many don’t realize the majority of accrued expenses pertain to operations and personnel, not hardware and software investments. In Joe’s case, realizing this helped him optimize and ensure the efficiency of his remote access technology, with help from NCP engineering. Want to learn how? Check out this video.
Tags: Joe the CIO, NCP engineering, Network Security, Poll, Readers' Poll, VPN
This week, we rejoined Joe the (paper) CIO on his quest to find the most thorough, cost-efficient way to secure his company’s corporate network. Now, we’d like to know more about your experience doing the same. Is your company doing enough to keep its information safe? Let us know how you feel in today’s poll – and as always, please feel free to elaborate in the comments section. Also, stay tuned next week for more Joe!
Tags: BYOD, IT security, mobile, mobile devices, Network Security, remote access, VPN