The integration helps companies control unmanaged devices In a bid to give IT departments better control over devices that employees bring to work, ForeScout Technologies has added MobileIron to the list of mobile management vendors its network access control platform can be integrated with. As the BYOD (bring-your-own-device) trend grows, IT departments are seeking ways to remain in control while letting employees use their own smartphones or tablets for work. Integrating ForeScout’s own network access control product CounterACT with a number of different mobile device management vendors helps with that, the company said.Last week the company announced integration with AirWatch.Part of ForeScout’s strategy has been to offer users freedom of choice and interoperability with their infrastructure and endpoint protection, or in this case, mobile device management, according to CEO Gord Boyce. ForeScout’s Mobile add-on module is used to accomplish the integration. It allows CounterACT to query for device attributes that can then be used to decide whether a smartphone or tablet should be allowed to access the network, get limited access or be shut out.One drawback with mobile device management systems is that they can only see and manage tablets and smartphones that have already been enrolled in the system, according to ForeScout. But when integrated with CounterACT, MobileIron’s agent can be installed on unmanaged devices through a self-enrollment process, it said. The Mobile add-on module costs from about US$28 per device and the integration with MobileIron will be available in March, according to ForeScout.Send news tips and comments to mikael_ricknas@idg.com Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO CSO and CISO CSO and CISO feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe