1. Articles in category: Network Access Control

    1-15 of 15
    1. It’s time to pull the trigger on security automation

      It’s time to pull the trigger on security automation

      It’s likely that you already have a variety of security tools -- intrusion prevention, network access control, endpoint security, mobile device management – that come with automation capabilities designed to quickly find and stop attacks.

      Now’s the time for security practitioners to take advantage of all the help they can get.

      Read Full Article
    2. Make BYOD Work: 9 Key Considerations

      Make BYOD Work: 9 Key Considerations

      More and more companies are allowing or encouraging employees to bring their own mobile devices (BYOD) to work. It's a trend that is expected to become more commonplace in the years ahead, bringing with it management challenges for organizations. This year, according to a report published by research and consulting firm Frost & Sullivan, some 70% of organizations in the US will tolerate or embrace BYOD activity. By 2018, that figure is expected to exceed 78%.

      Read Full Article
    3. Bring Everything: BYOD's Evolution In Higher Education

      Bring Everything: BYOD's Evolution In Higher Education

      Support for all stripes of mobile devices -- a new Bring Your Own Everything credo -- is now a must on college campuses, in the name of productivity and safety.

      The term BYOD is a natural evolution of wireless connectivity. Ten years ago, BYOD would have referred to laptops and the occasional PDA. Today, those PDAs have been replaced by smartphones and tablets. But higher education has gone so far beyond BYOD that we use a new acronym -- BYOE: Bring Your Own Everything.

      Read Full Article
    4. VMware jumps into mobile, but lacks network control

      VMware jumps into mobile, but lacks network control

      Last month, VMware made a big splash in the Enterprise Mobile Management (EMM) market by plunking down over $1.5 billion for AirWatch. EMM, formerly known as mobile device management (MDM), has been one of the hottest market segments in tech, primarily due to the seemingly unstoppable force know as BYOD. This acquisition comes a little over a year after Citrix purchased Zenprise to complement its mobile offering.

      Read Full Article
    5. Mobility management: Beyond MDM and BYOD

      MDM is a vital component of mobility management, but CIOs need to consider MAM, MIM and MPM to cover the many facets of managing a mobile workforce.

      The management of mobile devices is a simple extension to the "element management" methodology that has historically dominated  IT management.  But two obvious challenges to the MDM approach have now become clear.

      Read Full Article
    6. Network Access Control That Users Won't Hate

      Network Access Control That Users Won't Hate

      Even as schools strive to keep their networks and school data secure, they also want students to have a carefree, Starbucks-style wireless experience.  Increasingly, schools are utilizing network access control systems to help them establish that sweet spot. NAC has been around for a decade, but it only became an IT buzzword with the proliferation of BYOD. Gartner anticipates a NAC market growth of approximately 63 percent in 2013 alone.

      Read Full Article
    1-15 of 15
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Popular Articles