Why a "Bring Your Own Device" approach to mobile access security may not be such a bad idea.
When you ask Chief Security Officers for their nightmare scenario, they invariably mention either a network outage or an intrusion. For years, the enemies were known and relatively limited in number, but today we live in one open network, threats are more diverse, and the old “Maginot line” strategy is outdated. Times have changed, haven’t they? Well if you put yourself in the shoes of an enterprise network security professional, limiting access to internal resources might still be your holy grail. Unfortunately though, you now have more than just the one perimeter to deal with; you are now in charge of dozens, hundreds, maybe thousands of small and mobile networks: your users.