Articles about BYOD

How to manage the perfect BYOD rollout

byod_header_640_3_contentfullwidth

BYOD was once a buzzword coined to describe the increase of end-user owned devices entering the workplace and accessing corporate networks and applications. However, there are now a lot more smart mobile devices on the network which are running more bandwidth-intensive applications, than ever before. This is only set to increase according to IDC who predict that 79 percent of mobile devices in the enterprise will be "employee liable" by 2017.

Having a BYOD strategy is too invaluable to be cast aside, yet it still presents a number of challenges to IT managers, who need to ensure the security and integrity of their corporate resources and data. But at the same time they need to allow multiple users, including guests and employees, the flexibility they demand for using different devices, whether corporate-issued or part of the BYOD trend.

Continue reading

Security risk is the main reason for banning BYOPC

businessmen laptop notebook

According to a survey of IT decision makers commissioned by efficiency software specialist 1E and carried out by Vanson Bourne 86 percent of companies that ban employees from using their own PCs do so because of security concerns.

To address these fears 1E is launching its new MyWorkNow solution, a client-hosted virtual desktop (CHVD) to offer a fast, low-cost way of mobilizing workforces using their own PCs.

Continue reading

How businesses can reduce security risks

business-security

Embracing the digital revolution is unavoidable for businesses. It has brought great advantages with it too, such as anytime, anywhere communications and the storage of vital and personal information for use in our work and personal lives. It has also provided greater flexibility in where and how we work and communicate, making things much easier for us.

However, it is important to acknowledge security aspects when evaluating mobility policies in particular. Cyber attacks are on the increase and will continue in their complexity and frequency. We hear about serious breaches on a daily basis. This can range from password leaks or mobile phone hacks to international scale bugs. I often find that in the corporate world, many recognize the threats but fail to implement any strategy, let alone take tangible action. The good news is that there are steps that can be taken by businesses to drastically improve mobile security.

Continue reading

The right way to manage the downsides of BYOD

byod_header_640_3_contentfullwidth

For many organizations, bring your own device (BYOD) is now a fact of life. More than 70 percent of employees use their own smart phone or tablet to access corporate data. However this doesn't mean we should simply accept the trend and moving on. While many organizations have seen benefit in exploiting employees' willingness to invest their own money in mobility, others have seen a rise in cost and complexity.

The built-in assumption that organizations will save money under BYOD by sidestepping the cost of devices doesn't tell the whole story. The price of mobility goes beyond hardware and there are a number of hidden costs under BYOD that mobility managers need to grapple with.

Continue reading

BYOD and the issues of managing VDI and VDA

Tom_stressed_contentfullwidth

Software licensing is a complex area, even in organizations with a relatively simple IT infrastructure. Once BYOD (bring your own device) is added into the mix, this takes licensing complexity to a whole new level.

There is much debate over the actual take-up of BYOD. Some sources say adoption is "exploding", others say less than 10 percent of organizations actually have a BYOD policy in place. Regardless of what the true value is, we can expect an increased level of uptake, given the recent announcement of Microsoft Office for the iPad. So BYOD will become even more attractive to end users, and potentially make life even more difficult for the license manager.

Continue reading

Only 39 percent of companies have a BYOD policy

BYOD

It seems that allowing employees to use their own devices is an inevitable trend for most businesses. Yet a new survey by Software Advice finds that only 39 percent of workplaces have policies in place to cope with BYOD.

Businesses need to deal with the risks that BYOD brings. This includes the loss of visibility once company data is transferred to a personal device, privacy and legal concerns and the threat that devices could be compromised.

Continue reading

No BYOD policy? Now is the time to prioritize user-oriented IT

BYOD

Halfway through 2014 and the use of personal devices in the workplace is very much common practice across most workforces in the US and UK. However, whilst many people are still talking about the effect the "bring your own device" policies (BYOD) are having on staff productivity, the cost-saving discussions have remained on the side-lines.

According to recent research, having the latest consumer device to use in the boardroom or replacing a notepad for a tablet is proving to be so popular with employees that 39 percent not only purchase their own device for work purposes but also spend more of their own money on devices than on tea and coffee.

Continue reading

Controlling how employees use the web in a changing world [Q&A]

BYOD

As businesses face new challenges from employees use of public cloud services along with demands to allow BYOD use, they're increasingly looking for ways to monitor and control the activity of staff on the web.

We spoke to Brian Azzopardi, founder and CEO of web filtering specialist Rawstream about how enterprises can meet these new demands and why existing products aren’t always up to the task.

Continue reading

95 percent of employers are concerned about security risks from BYOD

BYOD

Allowing employees to use their own devices is an increasingly popular trend, but BYOD opens up security threats that can leave company data vulnerable. A new survey commissioned by security specialists Webroot looks at the reality of mobile security.

In particular it focuses on the difference in perception between companies and employees when it comes to securing mobile devices. Whilst there are some areas of agreement there are also signs that some employees don't take adequate steps to protect company data.

Continue reading

BYOD or CYOD -- which is the right choice for your organization?

AGILE_WORK_contentfullwidth

Over the past few years it seems that the Bring Your Own Device (BYOD) phenomenon has taken businesses by storm, and on the face of it you can see why.

Employees pay for their own devices, which means that businesses avoid the majority of the associated upfront costs. Workers are often happy to do this, as it means they can bring their favorite gadget to work and not be forced into using a corporate one they might be unfamiliar with. These employees already know the ins-and-outs of their devices and, as a result, are often much more productive when working on them. However, due to security and practical resource concerns, not all companies have adopted the BYOD approach with gusto.

Continue reading

US Department of Defense gives nod of approval to five Samsung Galaxy devices

Saluting Flag USA Soldier Man

South Korean manufacturer Samsung announced, earlier today, that five of its Knox-enabled Galaxy smartphones and tablets have been approved by the US Department of Defense for use on its unclassified defense networks.

The devices in question are the Galaxy S4, Galaxy S4 Active, Galaxy Note 3, Galaxy Note Pro 12.2 and Galaxy Note 10.1 2014 Edition, running Android 4.4 KitKat, with Knox 1.x in tow. The company's latest smartphone flagship, the Galaxy S5, as well as other Android handsets sporting Knox 2.x have not received the nod of approval from the DOD, which would have allowed them to be included in the Defense Information System Agency's Approved Product List (APL).

Continue reading

Sophos helps enterprises secure mobile access

mobile security

With more and more demands to go mobile and allow employees to use their own devices, the challenge for businesses is to keep their data secure.

Following a recent survey which showed that 84 percent of organizations allow access to public cloud services like Dropbox and 65 percent don’t encrypt data between cloud and mobile devices, security specialist Sophos is launching Sophos Mobile Control 4.0.

Continue reading

How worried should you be about BYOD security?

padlock phone

Businesses are increasingly allowing employees to choose their own devices or use personal kit to access corporate networks.

This brings a number of support challenges, not least in keeping corporate data safe. However, a recent study by Gartner shows that people are paying little regard to security when using their own devices for work.

Continue reading

Samsung Galaxy S5 gets down to business

Business traveller

Businesses want to have a certain level of control over the smartphones their employees bring into work environments. This means vendors which cater to these kind of needs, through dedicated management tools and software designed to isolate personal and work content, are more likely to get on their good side, and grab significant enterprise market share in the process.

South Korean maker Samsung offers a BYOD-friendly solution that is meant for its top Android devices. Called Knox, it received two major revisions, the most-recent of which was unveiled at MWC 2014 in February, since its introduction more than a year ago. It has been made available for devices like the Galaxy S4 and Galaxy Note 3. And, today, Samsung announced Knox (albeit in its latest iteration, version 2.0) also greets the Galaxy S5.

Continue reading

The security risks of BYOD -- Amtel [Q&A]

BYOD jigsaw

Allowing employees to use their own mobile devices for work has led to a number of new challenges, particularly when it comes to keeping devices and data secure.

We talked to PJ Gupta, CEO of mobile security specialist Amtel about the risks BYOD presents to enterprises and what they can do to ensure they remain safe.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.