| Keylogger Software Provides a Practical Monitor Solution for People | |
|---|---|
| Tweet Topic Started: May 9 2013, 03:16 AM (232 Views) | |
| csdjohnson2 | May 9 2013, 03:16 AM Post #1 |
|
Enterprise strategy group’s senior director of analysts Oltsik suggested that in addition to using the device authentication tools on the device (probably through RADIUS and 802.1X) to install a digital certificate, the administrator also need to detect web browsing, checking each MAC address, making sure it belongs to certain PC or mobile device. Oltsik said: "Only by doing this, you will be able specifically apply network access policies." Next-generation firewalls can also help monitor the BYOD security. These devices have application-aware capabilities, which can ensure the use of strategies, and also can help network administrators to monitor network activity. Edited by csdjohnson2, Oct 29 2014, 06:06 AM.
|
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · General Discussion · Next Topic » |






2:52 PM Jul 11