Readers’ Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments. [polldaddy...

Readers' Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments. [polldaddy...

Readers’ Poll: How Often Do You Use DirectAccess?

Over the past week, we’ve featured a series of installments that answer your questions about VPNs and DirectAccess. Of particular interest to you were the hardware requirements for DirectAccess, if DirectAccess supercedes VPNs, and what issues Microsoft could improve or optimize. Before releasing Part 4 of the series, we want to know: How often do you actually use DirectAccess? As always, please elaborate in the comments. [polldaddy...

Readers' Poll: How Often Do You Use DirectAccess?

Over the past week, we’ve featured a series of installments that answer your questions about VPNs and DirectAccess. Of particular interest to you were the hardware requirements for DirectAccess, if DirectAccess supercedes VPNs, and what issues Microsoft could improve or optimize. Before releasing Part 4 of the series, we want to know: How often do you actually use DirectAccess? As always, please elaborate in the comments. [polldaddy...