BYOD

BYOD news, analysis, research, how-to, opinion, and video.

VMware Workspace One Mobility BYOD

Security Requirements Are Driving Identity Management

Cybersecurity professionals are getting more involved in identity and access management (IAM) decisions and day-to-day operations driving changes to IT and infosec.


apps and data representations being erased from a chalkboard

Containerization moves beyond the full erase

The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security.

Android Tablet Apps

Detachable tablet market set for growth in 2016

Tablet shipments are down, but more people are turning to hybrid devices like the Surface Pro 4. IDC predicts that sales of these detachable devices will grow 75 percent in 2016.

byod mobile tablets smartphones users devices

Struggling with shadow IT? Maybe re-evaluate the IT department

Many IT folks like to blame users for not following the rules, but that's a fundamental misunderstanding of IT's role.

byod zombies

Wearables, IoT spark interest in mobility management tools

BYOD hype has abated, but the problems of unmanaged devices are real.

google htc nexus 9 tablet tablets

Tablet shipments are down, but they're gaining ground at work

Overall tablet shipments may have dropped in recent quarters, but workplace uses for the devices are still growing in the U.S.

byod security

Half of U.S. businesses have no formal BYOD policy for security

Years after the widespread adoption of workplace smartphones, more than half of U.S. companies said they have no formal BYOD (bring your own device) policy to safeguard their enterprises, according to a survey.

video

Microsoft's Surface Pro 4, the tablet that can finally replace your laptop

With the Surface Pro 4, Microsoft builds on the previous generations of the Surface line, getting them closer than ever to their goal of creating a tablet that will replace your laptop.

byod laptop mobile

Is It time to re-evaluate your BYOD policy?

How can you tell if your employees have gone rogue with their personally owned devices and put corporate data at risk?

iphone enterprise

Apple in the enterprise: Tim Cook capitalizes on what Steve Jobs ignored

Apple CEO Tim Cook is boasting impressive growth in the enterprise, a market that his legendary predecessor ignored.

wearables workers

Are wearables worth the cybersecurity risk in the enterprise?

The rise of the Internet of Things (IoT) and smart wearable devices pose new risks to enterprise cybersecurity.

mobile hotpsots best practices

Shape of mobility to come isn’t clear

The way businesses architect their operations to take best advantage of mobile technology, and the way they manage those mobile devices, are likely to evolve in the near future – but the precise nature of that evolution is far from...

byod keyboard bring your own device mobile

BYOD is as entrenched (and complicated) as ever

The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

decontamination shower radiation protection suit chemical toxic substance nuclear power station 000

'Culture of denial': Nuclear industry's cybersecurity shortcomings revealed in new report

International policy institute Chatham House says that the use of default passwords and a lack of air-gapping are among the causes of nuclear infrastructure vulnerability.

smartphones tablet mobile devices

More data breaches caused by lost devices than malware or hacking, Trend Micro says

Trend Micro's new cybersecurity report says most breaches are actually caused by device loss, rather than malware or hacking.

Mobile device management illustration

Mobile device management has become alphabet soup

The BYOD movement, once looked on as the holy grail of employee satisfaction and IT mobile device security, is increasingly being supplanted by a number of options – such as COBO, CYOD, COPE – that draw a thicker line between personal...

mobile apps and touch screen

Is a lack of enterprise apps killing BYOD?

Bring-your-own-device policies in the workplace often pit employee satisfaction and privacy against corporate security. And as the number of employees and companies participating in BYOD programs continues to fall, can enterprise apps...

man texting

5 ways to shore up security in your BYOD strategy

Despite years in the making, many security leaders are still wary about BYOD policy. Here are five ways to combine security and privacy with the ever-increasing demand for user-owned devices in the enterprise.

byod

BYOD – the tech revolution that wasn’t

Once upon a time, BYOD and the consumerization of IT was held up as a paragon of productivity and cost savings for enterprises that embraced the concept. Now? Not so much… What happened?

Load More