Fluke Networks increases BYOD device visibility
Posted on 18 December 2012.
Fluke Networks announced a new BYOD Classification capability that reduces the cost and time needed to optimize and secure a wireless network for authorized and unauthorized smartphones and tablets.

The new over-the-air patent pending smart device detection and analysis capability, available in AirMagnet WiFi Analyzer PRO (10.5) and AirMagnet Enterprise (10.6), provides visibility into smart device type, operating system and usage details without the need to deploy end-user software agents.

According to Gartner, 821 million smart devices (smartphones and tablets) will be purchased worldwide in 2012, accounting for 70 percent of total devices sold.1 As these devices come onto corporate networks, it is increasingly critical for network engineers to be able to identify and report on them, optimize the network for BYOD in real-time, and instantly identify and take action when unauthorized devices or rogues appear.

"There's no denying the end-user or organizational value of smart devices. But, we face technical challenges when managing them for performance and security, especially when they're not authorized," said Rich Green, lead wireless engineer at Community Health Systems. "The new BYOD Classification feature streamlines managing authorized smart devices, and gives us a new weapon for tracking unauthorized smart devices and rogues by eliminating the need for client software on these devices. Now we can get valuable information on any smart device so we can ensure performance and protect the network."

"Today's wireless engineer is only as good as the information he or she can get about the network and its activity. The new capability in AirMagnet WiFi Analyzer PRO and AirMagnet Enterprise instantly gives them the intelligence needed to optimize the network for smart device usage or take action against possible smart device threats," said Chia-Chee Kuan , vice president and general manager of the Fluke Networks WLAN business unit.





Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //