Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

11/27/2012
06:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

'Bring Your Own Network' Policy Tackles Rising Network Costs And Security In The Enterprise, iPass White Paper

Whitepaper outlines how CIOs and IT departments can boost mobile working practices effectively and tackle the rising security risks and costs of BYOD and BYON policies

REDWOOD SHORES, Calif., Nov. 27, 2012: iPass Inc. (NASDAQ: IPAS), the global Wi-Fi and enterprise mobility services leader, today announced the availability of a new white paper titled: "Why ‘Bring Your Own Device’ Needs ‘Bring Your Own Network’ to be Successful." The white paper illuminates how a BYON (Bring Your Own Network) strategy can effectively counteract rising network costs and security threats in addition to enabling a significant increase in mobile worker productivity outside of the office.

While many enterprises are rapidly embracing a more mobile workforce and supporting a BYOD strategy, a big unresolved problem for many is the cost of wireless network access. While devices are relatively cheap the wireless networks they run on are expensive. BYOD is all about allowing employees to choose and use their own mobile devices so they can access data and applications whenever they want and wherever they are, and BYON is about enterprises having policies in place to right-size the wireless access costs for employee tasks. Without a clear plan for purchase of wireless access, employees may make costly decisions (all in the name of "getting things done"), pushing connection costs into a budgetary black hole. Essentially, no BYOD plan is complete without a BYON companion.

“The escalation in productivity from mobile workers outside of the office has put more pressure on wireless networks, making them more complex to manage and making costs harder to control within an organization,” said Christophe Culine, senior vice president and general manager, iPass Enterprise. “With a ‘Bring Your Own Network’ approach, enterprises enable their mobile workers to access secure global Wi-Fi networks at a fraction of cellular data roaming costs. Mobile workers want to do what’s right for their companies and 55 percent of them report an additional 10 or more hours of work each week with smartphone, tablet and laptop access to cloud services outside of the office. Those additional work hours help the bottom line of companies that have a clear path to supporting mobile worker productivity.”

CIOs and IT now have choices for supporting different employee populations with clearly defined, differentiated policies for devices, access control and expense liability. These choices will enable IT to make BYOD—and BYON—successful for both employees and the enterprise.

For more information about iPass or to obtain a copy of the Bring Your Own Network white paper please visit: http://www.ipass.com/solutions/byon.

About iPass Inc. iPass helps enterprises and telecom service providers ensure their employees and subscribers stay well connected. Founded in 1996, iPass (NASDAQ: IPAS) delivers the world’s largest commercial-grade Wi-Fi network and trusted connectivity platform. With more than one million Wi-Fi hotspots across 113 countries and territories, iPass gives its customers always-on, frictionless connectivity for smartphones, tablets and laptops anywhere in the world – simply, securely and cost-effectively. Additional information is available at www.iPass.com or on Smarter Connections, the iPass blog.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32089
PUBLISHED: 2021-05-11
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on Zebra (formerly Motorola Solutions) Fixed RFID Reader FX9500 devices. An unauthenticated attacker can upload arbitrary files to the filesystem that can then be accessed through the web interface. This can lead to information disclosure and c...
CVE-2020-24586
PUBLISHED: 2021-05-11
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted us...
CVE-2020-24587
PUBLISHED: 2021-05-11
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and...
CVE-2020-24588
PUBLISHED: 2021-05-11
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802....
CVE-2020-26139
PUBLISHED: 2021-05-11
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and...