Fluke Networks increases BYOD device visibility
Posted on 18 December 2012.
Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized smartphones and tablets.

The new over-the-air patent pending smart device detection and analysis capability, available in AirMagnet WiFi Analyzer PRO (10.5) and AirMagnet Enterprise (10.6), provides visibility into smart device type, operating system and usage details without the need to deploy end-user software agents.

According to Gartner, 821 million smart devices (smartphones and tablets) will be purchased worldwide in 2012, accounting for 70 percent of total devices sold.1 As these devices come onto corporate networks, it is increasingly critical for network engineers to be able to identify and report on them, optimize the network for BYOD in real-time, and instantly identify and take action when unauthorized devices or rogues appear.

"There's no denying the end-user or organizational value of smart devices. But, we face technical challenges when managing them for performance and security, especially when they're not authorized," said Rich Green, lead wireless engineer at Community Health Systems. "The new BYOD Classification feature streamlines managing authorized smart devices, and gives us a new weapon for tracking unauthorized smart devices and rogues by eliminating the need for client software on these devices. Now we can get valuable information on any smart device so we can ensure performance and protect the network."

"Today's wireless engineer is only as good as the information he or she can get about the network and its activity. The new capability in AirMagnet WiFi Analyzer PRO and AirMagnet Enterprise instantly gives them the intelligence needed to optimize the network for smart device usage or take action against possible smart device threats," said Chia-Chee Kuan , vice president and general manager of the Fluke Networks WLAN business unit.





Spotlight

The context-aware security lifecycle and the cloud

Posted on 25 November 2014.  |  Ofer Wolf, CEO at Sentrix, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Nov 26th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //