This resource is no longer available
"Context of Access" involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more.
"It’s creating a three-dimensional picture of that user on that device at that moment in time," according to mobile security guru and industry veteran, Michael Oldham.
If you’re even marginally concerned about how today’s mobile workforce can spell disaster for your network (or that new employee using his/her iPhone or Android to tap into your VPN), view this featured security blog.