Securing Personal and Mobile Device Use with Next-Gen Network Access Controls

  • Friday, 14 Nov 2014 1:00PM EST (14 Nov 2014 18:00 UTC)
  • Speakers: Jack Marsal, Joshua Wright, Matt Santill

"Bring Your Own Everything" With Integrative Network Access Controls

IT consumerization has disrupted conventional endpoint security protections, whether the end users' mobile devices are owned by the employee and supported through a "Bring Your Own Device" (BYOD) program or provided by the organization ("Choose Your Own Device"). This level of ubiquitous access produces gains in workforce productivity, but it also represents new layers of risk for which traditional endpoint controls are unsuitable. Meanwhile, hacks, drive-by downloads and phishing have found fertile ground in these devices, which are difficult for organizations to identify, manage and secure on a user-by-user basis. Intrusions and exploits are occurring through many means, including mobile device users contracting malware from a website or clicking malicious links in e-mail and SMS messages, or through dangerous personal applications and even jailbroken devices, which are known to be the most vulnerable to rootkits. Fortunately, a robust, integrated, mature NAC solution can enable and support "Bring Your Own Everything" by thoroughly managing the risks associated with such an environment

Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing the role of NAC in a BYOD environment.

Please send questions about this webcast to

View the associated whitepaper.