If I understand your layer 2 security question correctly, this is basically referring to what I've mentioned above -- authentication using EAP/802.1x that requires the user/client to authenticate itself to the network via a password, token, digital certificate, etc. This is in contrast to a standard layer 3 solution such as a standard VPN running across a wireless network.
Dig Deeper on Mobile Device Security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.