"Bring Your Own Everything" With Integrative Network Access Controls
IT consumerization has disrupted conventional endpoint security protections, whether the end users' mobile devices are owned by the employee and supported through a "Bring Your Own Device" (BYOD) program or provided by the organization ("Choose Your Own Device"). This level of ubiquitous access produces gains in workforce productivity, but it also represents new layers of risk for which traditional endpoint controls are unsuitable. Meanwhile, hacks, drive-by downloads and phishing have found fertile ground in these devices, which are difficult for organizations to identify, manage and secure on a user-by-user basis. Intrusions and exploits are occurring through many means, including mobile device users contracting malware from a website or clicking malicious links in e-mail and SMS messages, or through dangerous personal applications and even jailbroken devices, which are known to be the most vulnerable to rootkits. Fortunately, a robust, integrated, mature NAC solution can enable and support "Bring Your Own Everything" by thoroughly managing the risks associated with such an environment
Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing the role of NAC in a BYOD environment.
Please send questions about this webcast to firstname.lastname@example.org.
View the associated whitepaper.