BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement.
Perhaps nowhere else in IT is the opportunity to innovate as rich as it is with enterprise mobility. Smartphones and tablets offer the chance to improve everything from employee productivity to how you interact with customers and achieve competitive advantage. But most enterprises are trying to implement modern mobility strategies using existing IT organizational structures.
Mobile-device security startup Averail makes its debut today with its "containerization" software and service intended to give IT managers control over mobile-device apps and their content.
Cloud computing vendor, Citrix, has inked a distribution deal with Wavelink, following Citrix’s acquisition of mobile device management company, Zenprise, in January.
Bring Your Own Device (BYOD) and mobile device management (MDM) is driving security growth within the mobility space, according to Kaspersky Labs A/NZ managing director, Andrew Mamonitis.
Citrix has announced its mobile device management platform, XenMobile, which will offer companies a secure way for employees to access native Citrix apps in the cloud as well as third-party software, such as Windows, SAP or even Salesforce.com.
Professional golf teed off for another season in 2013 with the use of rugged handheld computers to help lower costs and improve efficiency in scoring and reading tickets at the gate.
The newly rechristened BlackBerry delivered on its promise to breathe new life into an aging, iconic product line, but it still faces an uphill battle in a market dominated by Apple's iPhone and devices based on Google's Android operating system.
Customers are pushing the limits of the software -- asking it to manage and do many more things than it was originally created to do -- and vendors are happy to oblige.
As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat.
New containerization technologies can help BYOD initiatives succeed by creating separate spaces on smartphones for work and personal use.
Sign up now »
A data security breach is every organisation’s worst nightmare. It impacts the relationship with your employees, erodes the trust with your customers and threatens your organisation’s reputation
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- AusCERT 2013: What's it like to be a 'Nigerian scam' victim?
- AusCERT 2013: Ashley Deuble: Network Security Monitoring with Security Onion
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes