Articles about BYOD

The key IT trends to expect in the year ahead


Now that 2014 is done and dusted, it’s time to look ahead and start thinking about what this year has in store.

We recently had the chance to hear from Getronics CIO Tim Patrick-Smith, who shared his thoughts on what will be some of the key IT trends in 2015.

Continue reading

Lack of IT skills is hindering cloud and BYOD deployment

Warning Sign Sky Cloud Cloudy

Utilizing the power of cloud technology and mobilizing the workforce are two key interests for most organizations, but several issues are currently affecting progress in the field.

In a survey conducted by NaviSite and Time Warner Cable on migration to the cloud and BYOD (bring your own device) support, several key points were brought up on the reasoning behind the slow progress.

Continue reading

Managing mobility in the age of BYOD


Mobile device management (MDM) solutions have been an enterprise mainstay for years, enabling IT to manage enterprise-owned smartphones and tablets in a way similar to how PCs and laptops are managed -- by taking complete control of them. But when it comes to personal mobile devices entering the IT environment via bring-your-own-device (BYOD) programs, MDM solutions struggle to provide the flexibility that IT now requires.

As the name states, MDM is focused on managing devices. It allows IT to control the entire environment of a smart device: provisioning, tracking usage and location, enforcing policies, ensuring security encryption, pushing approved enterprise apps to the device, and locking the device down or wiping it if necessary. It is a heavy-handed but very useful approach to managing corporate-owned smartphones and tablets. When it comes to personally owned devices, however, IT cannot take the same approach. Users don’t want to give IT complete control over their device. They don’t want their usage and location tracked when they aren’t at work. They don’t want to be limited in the kinds of apps they download and use. And they don’t want to give IT the power to access or wipe personal information, such as photos and text messages.

Continue reading

Businesses underestimating the Wi-Fi demand caused by BYOD

Businessman scowls at blackberry  (Steve Heap/Shutterstock)

Enterprises continue to struggle with Bring Your Own Device (BYOD) as employees continue to demand the freedom that comes with mobility in accordance with new trends. Security has long been discussed as the primary challenge when it comes to BYOD. Yet, other reasons such as network access is fast becoming a key concern for IT departments but also the key frustration for employees.

When it comes to connectivity, employee expectation is that it just works and as such this expectation must not be overlooked when implementing a BYOD roll-out.

Continue reading

Companies add more physical security to combat BYOD risks

photo by Slavoljub Pantelic, Shutterstock

According to a new survey carried out for security device specialist Kensington, 73 percent of executives recognize that BYOD presents greater risks for the organization.

However, 59 percent still approve the use of personal devices for business use and to address concerns 55 percent are planning to invest more in physical security.

Continue reading

Secure mobile platform helps smaller businesses adopt BYOD

Tablet BYOD building

Allowing employees to use their own devices for work is increasingly popular, but it can present problems for smaller businesses when it comes to implementing the technology and keeping it secure.

California-based hopTo has an answer for small and medium businesses in the form of its mobile productivity platform hopTo Work. The platform provides instant BYOD functions with a flexible and secure mobile workspace.

Continue reading

The mobile device is the new company car


I've been in the market long enough to have lived the glorious years when as a salesperson, you would join a new company primarily because of the salary and benefits it offered above any other consideration.

At that time, one of the important benefits was the company car, and once you had it, the next question was; how flexible would the company be around its use?

Continue reading

How to manage the perfect BYOD rollout


BYOD was once a buzzword coined to describe the increase of end-user owned devices entering the workplace and accessing corporate networks and applications. However, there are now a lot more smart mobile devices on the network which are running more bandwidth-intensive applications, than ever before. This is only set to increase according to IDC who predict that 79 percent of mobile devices in the enterprise will be "employee liable" by 2017.

Having a BYOD strategy is too invaluable to be cast aside, yet it still presents a number of challenges to IT managers, who need to ensure the security and integrity of their corporate resources and data. But at the same time they need to allow multiple users, including guests and employees, the flexibility they demand for using different devices, whether corporate-issued or part of the BYOD trend.

Continue reading

Security risk is the main reason for banning BYOPC

businessmen laptop notebook

According to a survey of IT decision makers commissioned by efficiency software specialist 1E and carried out by Vanson Bourne 86 percent of companies that ban employees from using their own PCs do so because of security concerns.

To address these fears 1E is launching its new MyWorkNow solution, a client-hosted virtual desktop (CHVD) to offer a fast, low-cost way of mobilizing workforces using their own PCs.

Continue reading

How businesses can reduce security risks


Embracing the digital revolution is unavoidable for businesses. It has brought great advantages with it too, such as anytime, anywhere communications and the storage of vital and personal information for use in our work and personal lives. It has also provided greater flexibility in where and how we work and communicate, making things much easier for us.

However, it is important to acknowledge security aspects when evaluating mobility policies in particular. Cyber attacks are on the increase and will continue in their complexity and frequency. We hear about serious breaches on a daily basis. This can range from password leaks or mobile phone hacks to international scale bugs. I often find that in the corporate world, many recognize the threats but fail to implement any strategy, let alone take tangible action. The good news is that there are steps that can be taken by businesses to drastically improve mobile security.

Continue reading

The right way to manage the downsides of BYOD


For many organizations, bring your own device (BYOD) is now a fact of life. More than 70 percent of employees use their own smart phone or tablet to access corporate data. However this doesn't mean we should simply accept the trend and moving on. While many organizations have seen benefit in exploiting employees' willingness to invest their own money in mobility, others have seen a rise in cost and complexity.

The built-in assumption that organizations will save money under BYOD by sidestepping the cost of devices doesn't tell the whole story. The price of mobility goes beyond hardware and there are a number of hidden costs under BYOD that mobility managers need to grapple with.

Continue reading

BYOD and the issues of managing VDI and VDA


Software licensing is a complex area, even in organizations with a relatively simple IT infrastructure. Once BYOD (bring your own device) is added into the mix, this takes licensing complexity to a whole new level.

There is much debate over the actual take-up of BYOD. Some sources say adoption is "exploding", others say less than 10 percent of organizations actually have a BYOD policy in place. Regardless of what the true value is, we can expect an increased level of uptake, given the recent announcement of Microsoft Office for the iPad. So BYOD will become even more attractive to end users, and potentially make life even more difficult for the license manager.

Continue reading

Only 39 percent of companies have a BYOD policy


It seems that allowing employees to use their own devices is an inevitable trend for most businesses. Yet a new survey by Software Advice finds that only 39 percent of workplaces have policies in place to cope with BYOD.

Businesses need to deal with the risks that BYOD brings. This includes the loss of visibility once company data is transferred to a personal device, privacy and legal concerns and the threat that devices could be compromised.

Continue reading

No BYOD policy? Now is the time to prioritize user-oriented IT


Halfway through 2014 and the use of personal devices in the workplace is very much common practice across most workforces in the US and UK. However, whilst many people are still talking about the effect the "bring your own device" policies (BYOD) are having on staff productivity, the cost-saving discussions have remained on the side-lines.

According to recent research, having the latest consumer device to use in the boardroom or replacing a notepad for a tablet is proving to be so popular with employees that 39 percent not only purchase their own device for work purposes but also spend more of their own money on devices than on tea and coffee.

Continue reading

Controlling how employees use the web in a changing world [Q&A]


As businesses face new challenges from employees use of public cloud services along with demands to allow BYOD use, they're increasingly looking for ways to monitor and control the activity of staff on the web.

We spoke to Brian Azzopardi, founder and CEO of web filtering specialist Rawstream about how enterprises can meet these new demands and why existing products aren’t always up to the task.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.