Chapter 1. Regain Control of Your IT Security

The explosion of mobility, virtualization, social networking, and ubiquitous network access coupled with the consumerization of Information Technology brings new security challenges to organizations, including:

Image Insufficient security controls for non-corporate-owned devices, especially consumer-class devices such as the iPhone and iPad. This is known as the Bring Your Own Device (BYOD) phenomenon.

Image An increased potential for the loss of sensitive data, which can cause an array of problems for your business, ...

Get Cisco ISE for BYOD and Secure Unified Access now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.