This document discusses how bring your own device (BYOD) policies will impact wireless network security in 2012. It notes that allowing personal smartphones to connect to enterprise networks can introduce intrusion and data leakage threats from malware and unsecured apps. Common security practices like MAC address filtering and mobile device management are limited in addressing threats from personal devices. The document argues that wireless intrusion prevention systems (WIPS) can automatically detect and block unauthorized personal devices on the network through device fingerprinting and policy enforcement, while still providing protection from traditional wireless attacks. WIPS uses sensors to identify approved and unapproved devices by attributes like type, name, MAC address and location to enforce security policies across the wireless network.