BYOD - News, Features, and Slideshows

News

  • Pretty much everybody still confused by mobile management

    Despite the abundance of expert opinion, commentary and debate surrounding BYOD and mobile device use in the enterprise, there are still few clear answers to some of the biggest problems out there, according to a panel of experts that spoke at Interop.

  • The science of app-wrapping

    BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement.

  • Enterprise mobility demands an innovative approach to IT organization

    Perhaps nowhere else in IT is the opportunity to innovate as rich as it is with enterprise mobility. Smartphones and tablets offer the chance to improve everything from employee productivity to how you interact with customers and achieve competitive advantage. But most enterprises are trying to implement modern mobility strategies using existing IT organizational structures.

  • Do's and don'ts for using Android in business

    While it's important to remember that the use of Google Android software in the enterprise is still a comparatively young phenomenon, there are a few general guidelines that businesses looking to use the platform would do well to remember.

  • Verify the security of your mobile apps

    The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage to your business.

  • How to avoid BYOD disasters

    Imagine an organisation where employees are given several consecutive months of vacation every year. It sounds like a dream, but in the era of BYOD, it could also be an IT exec's worst nightmare.

  • Securing the network beyond passwords

    Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network.

[]