Welcome Guest [Log In] [Register]
Add Reply
Keylogger Software Provides a Practical Monitor Solution for People
Topic Started: May 9 2013, 03:16 AM (232 Views)
csdjohnson2

Enterprise strategy group’s senior director of analysts Oltsik suggested that in addition to using the device authentication tools on the device (probably through RADIUS and 802.1X) to install a digital certificate, the administrator also need to detect web browsing, checking each MAC address, making sure it belongs to certain PC or mobile device. Oltsik said: "Only by doing this, you will be able specifically apply network access policies."

Next-generation firewalls can also help monitor the BYOD security. These devices have application-aware capabilities, which can ensure the use of strategies, and also can help network administrators to monitor network activity.
Edited by csdjohnson2, Oct 29 2014, 06:06 AM.
Offline Profile Quote Post Goto Top
 
1 user reading this topic (1 Guest and 0 Anonymous)
« Previous Topic · General Discussion · Next Topic »
Add Reply