Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Anytime, anywhere connectivity. Hyperconnectivity. Call it what you will, but what it equates to is we – me, you, and just about everyone in the worldwide workforce – are always connected to something.  We not only want, but many times need to be connected, wherever we are.


In their most recent quarterly report on today’s global, mobile workforce (The iPass Global Mobile Workforce Report), iPass, a worldwide leader in managing mobile connectivity for large enterprises and global carriers through mobility and cloud services, reported that 88% of those surveyed work from the road, including 84% from  coffee shops, restaurants or bars.


Our need to be always connected has taken many of our employers – and in a domino effect, their service providers – by surprise. This has caused a significant spike in mobility costs, which in turn has driven up the mobility expense incurred by many enterprises today, especially those with worldwide globetrotters. Since mobile workers must be connected all the time, Internet connectivity has become a mobile worker’s lifeline.


Now, Juniper Networks and iPass deliver simple anytime, anywhere trusted network connectivity and role-based, secure, mobile remote access through a single client over a myriad of worldwide connectivity, types and means.


Is it time to embrace “Bring Your Own Device” (BYOD)?

by kenok ‎12-21-2011 09:28 AM - edited ‎12-24-2011 06:09 AM

In the IT Industry there is a topic that comes up on a regular basis and generates a lot of debate and that is Bring Your Own Device or BYOD as it is more commonly known. It seems that since the new wave of "smart phones" have come along the IT industry seems to have woken up to a threat that has existed since the early PDA's like the Psion or my beloved US Robotics Palm Pilot (which was released in 1996, its fifth generation sister has only just been retired from our household)

For as long as I can remember IT staff have been dumping data from corporate systems to their devices in one form or another. This data was unencrypted and unsecured and taken off the network and out of the building without considering data or security policies


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books