Wired Authenticated Access is a Chicken and Egg Problem, and It’s Scrambled Up

Mike Fratto
Mike Fratto

Summary Bullets:

  • Strong wired authentication and access control is available using 802.1X, which is needlessly complex in wired networks and 802.1ae which is not widely available.
  • Lack of customer demand doesn’t give equipment vendors any inducement to simplify 802.1X wired functions or add 802.1ae to network equipment. You can change that.

Ever wonder why 802.1X and 802.11i is so well supported in wireless LANs—even consumer grade access points—yet is complex and fragile in wired ports? It’s not the technology or differences in the capability of wireless compared to wired equipment. The reason is customer demand. You. The average enterprise user hasn’t demanded the same level of functionality in the wired network as they did in the wireless. Continue reading “Wired Authenticated Access is a Chicken and Egg Problem, and It’s Scrambled Up”

Mainstream Enterprises Still Struggling to Catch Up with the MDM/MAM Hype Cycle

Paula Musich
Paula Musich

Summary Bullets:

• Despite hype to the contrary, mobile device management and mobile application management is not mainstream

• Innovative vendors are out in front solving problems that most enterprises haven’t begun to even think about

The juxtaposition of this week’s strategic partnership announcement between Boxtone and Good Technology against our mid-October report on enterprise BYOD progress in 2012 serves as a great example of how big the disconnect is between the hype of MDM/MAM and reality of mainstream enterprise adoption of policies governing the use of employee-owned devices at work. The Boxtone/Good agreement calls for the integration of Good’s mobile application and data security functionality found in its Good Dynamics and Good for Enterprise products with BoxTone’s mobile device, analytics, and service management functions. The analytics piece, due in 2013, is especially intriguing. Planned instrumentation will allow enterprise IT to determine the frequency of use for mobile enterprise applications, monitor application performance and utilization, and monitor user behavior to learn whether enterprise mobile applications require end user training or ease of use enhancements. Such analytics will allow enterprises to get more bang for the development buck and insure desired productivity gains are achieved. Continue reading “Mainstream Enterprises Still Struggling to Catch Up with the MDM/MAM Hype Cycle”