ANAHEIM, CA — (Marketwired) — 10/15/13 — (EDUCAUSE Annual Conference 2013) Impulse Point, provider of the industry-s most scalable, and easiest to deploy and maintain network access control (NAC) solutions for diverse networks in support of BYOD, in partnership with SecureW2, announces the availability of AutoConnect, the next generation of cloud-based mobile device auto-provisioning for secure 802.1X-WPA2 Enterprise network on-ramping.
“We strive to provide our customers with security solutions that deliver maximum ROI to their mobile initiatives. Our customers are dealing with securing thousands to tens-of-thousands of mobile devices. AutoConnect offers a cloud-based approach to automating the end-user process of configuring a device for secure wireless access,” says Tim Evans, Vice President of Sales. “Our partnership with SecureW2 provides a unique opportunity to add a superior solution to our SafeConnect Family that exemplifies the -Impulse Experience- we strive to achieve with our valued clients.”
“WPA2-Enterprise wireless security is only effective if wireless devices are configured correctly across a variety of platforms,” says Taylor Jones, Director of Sales for SecureW2. “Most often BYOD users who manually configure their wireless devices skip important steps such as the proper setup of digital certificates. This leaves them susceptible to Active Directory or LDAP credential theft via networks that pretend to be legitimate, often referred to as man-in-the-middle attacks. AutoConnect will ensure that BYOD devices are as secure as they can be and greatly reduce the burden on help desk staff who are on the front lines of getting users onto the wireless network simply and securely.”
AutoConnect is compatible with all major operating systems (Windows, Windows RT, Mac OS X, Android, iOS, Linux and Kindle Fire) and supports a wide array of the industry-s most common Wireless EAP types that use credential, certificate and token authentication. Furthermore, AutoConnect can silently deploy the SecureW2 Enterprise Client, for simplified end-user configuration on secure networks using EAP-TTLS/PAP or PEAP/GTC protocols in addition to the SafeConnect Policy Key.
Customer benefits include a superior end-user experience for wireless network connectivity that directly increases secure network adoption and reduction of end-user help desk calls. Real-time reporting provides significant value for network administrators and help desk personnel by providing deep visibility into common connectivity issues and statistics at the individual device level.
Impulse Point delivers the industry-s most scalable and easiest to deploy and maintain BYOD management solutions. IdentityConnect and SafeConnect are the solutions of choice for large, diverse environments — such as Education — where the “Consumerization of IT” is driving the need to provide endpoint identification and security policy enforcement for a myriad of personally-owned, non-managed, mobile computing devices. Deployed and supported as a managed service, the products- rapid installation, network independence, and track record of reducing help desk calls result in lower total cost of ownership and reduced risk. Customers currently entrust the security of more than three million endpoints to Impulse Point. Visit or
SecureW2 is the leading authority in delivering easy-to-use, secure 802.1X and WPA2-Enteprise wireless for BYOD. SecureW2-s innovative, turnkey products are used by countless students and employees on millions of devices across five continents. As the quantity and diversity of unmanaged BYOD devices continues to grow, it has become increasingly important for network administrators and IT departments to prepare their networks. SecureW2 products automate authentication and configuration for secure wireless networks, making simple, self-service WPA2-Enterprise wireless access a reality for employees and students of institutions of all sizes. The combination of SecureW2-s vendor agnostic, standards-based functionality and world-class support services provides customers with a scalable path to enhanced security, device management and control. Visit
You must be logged in to post a comment Login