BYOD in pictures
News about BYOD
Interviews about BYOD
The mobility conversation may be driving Citrix’s business in A/NZ, though Fujitsu is also interested in the trend.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
At a well-known investment firm in New York City, something strange is happening: Mobile app performance issues and privacy concerns have sparked a Bring Your Own Device (BYOD) revolt, and now many employees are asking for their corporate BlackBerry back.
BYOD is now more than just BYOD, according to Webroot, according to worldwide consumer and SMB sales VP, David Bennett, who said the mobile environment has evolved to being about Bring-Your-Own-Other-Device (BYOOD).
Fronde expects the rise of “Internet of Things” to cause further BYOD headaches though the ramp up of corporate data traffic.
The sleuths over at The Verge reported last week that Microsoft is looking for beta testers for the pre-release versions of Office for Android. Despite a slow holiday week, the news traveled pretty fast. If you have an Android tablet, you can sign up at the SharePoint website for recruiting testers.
The biggest challenge with BYOD will be the diversity of devices that may connect to them, according to BAE Systems Applied Intelligence.
Public Wi-Fi is posing an increasing security risk as employees use their own devices to connect to corporate networks, according to BAE Systems.
Features about BYOD
Michael Keithley has more than two decades of experience as a CIO. However, the IT veteran says he's seeing more change now than ever before. CIO.com's Tom Kaneshige sat down with Keithley to talk about the challenges he and his colleagues face, the need to speak the same language as the business side and the reality of what lies ahead for CIOs who refuse to change their approach.
For Dell Software CIO Carol Fawcett, "BYOD" is not about being an expert on every mobile device in the world; it's about giving workers secure access to the apps and data they need on whatever device they are using.
The Samsung Galaxy S5 is an evolutionary device; the vendor’s new flagship is better than its predecessor across the board, without quite being revolutionary. But while it houses impressive hardware, it is let down by the infamous TouchWiz, Samsung’s own interface overlay which skins Google’s Android 4.4 Kit Kat operating system with heavy-duty software (and in some cases, gimmicks).
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
The mobile world changes fast. Case in point: A year ago thinking that Android devices could be on par with -- and perhaps even overtake -- Apple in the enterprise would have been considered crazy. But the today the race is neck and neck.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
New technologies and new IT strategies are here to solve all your problems -- except the ones they create
What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
It's a good bet you don't know how much your company is spending on all those bring-your-own-device smartphones and tablets. Even worse, it's probably too much, says a mobility management expert.
- Internet Explorer vulnerabilities surge to record levels in 2014, NVD figures reveal
- Apple faces privacy suit following Chinese TV report
- New guide aims to remove the drama of reporting software flaws
- Real-Time Analytics Helps Virginia Credit Union Prevent Fraud
- New SSL server rules go into effect Nov. 1
- Metrics a must for making the most of content marketing, says Forrester
- Ticketek: Modern marketing strategy is about treating people as people
- Salesforce.com launches Sales Reach for real-time selling and marketing
- A new kind of solicitude: Co-creation with customers
- Facebook reports a big sales jump, helped by mobile ads
- Intel appoints new director of Cloud policy and government affairs
- EXCLUSIVE: Dave Rosenberg appointed new Westcon A/NZ managing director
- Citrix and Fujitsu eye A/NZ mobility market together
- Achieva promises it won’t step on resellers’ heels in becoming a value-added dis...
- More News
- 25 Jul
- Dell Connected Security: Listen to what the experts have to say about security
- 29 Jul
- SplunkLive!; Canberra
- 05 Aug
- Systems Technology Day - Build Your Own Private Cloud
- 06 Aug
- Oracle Employee Experience Journey Mapping Workshops
- View all events