BYOD

BYOD news, analysis, research, how-to, opinion, and video.

handsome male executive holding finger up to be quiet keep a secret
Samsung Galaxy S8 and S8+ smartphones

01 intro byod

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

BlackBerry KeyOne smartphone merc_11_onwhite

Back to the future: BlackBerry KEYone launches with physical keyboard

Under a licensing deal with BlackBerry, TCL Communication of China announced another physical keyboard smartphone model called the BlackBerry KEYone.

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

person smartphone office table byod roaming

Forget the network perimeter, say security vendors

Security vendors start embracing Google's BeyondCorp network security model that treats all apps and devices as being on the Internet instead of assigning higher trust to local networks.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

mobile business

Uniting the digital enterprise

Enterprise mobility management isn’t just for mobile devices and applications anymore.

5 handy mobile dropbox tips comment on a file 3

Employees feel pressure to use personal smartphones at work

Businesses are encouraging employees to use personal devices for work purposes, but according to a recent survey, without a proper BYOD strategy and reimbursement plan in place, it might be decreasing productivity.

apple mac macbook

IBM, LEGO offer Macs as recruiting tool

In a tight labor market, employers aim to differentiate themselves on multiple fronts, including tech.

Bring your own device to

How to implement an effective BYOD policy

Companies have accepted that BYOD is a reality. The challenge now is striking a balance between security and flexibility.

flying cell tower

Businesses brace for cost-cutting measures as the use of wireless data expands

Wireless data spending is growing for U.S. businesses as workers increase their use of smart devices on the go for everything from communication, collaboration and other business uses to shopping and watching videos. This article...

security padlock on keyboard locked computer stock

Gartner’s top 10 security predictions

Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each.

messaging apps threats security privacy thought bubbles

BYOD can pose privacy risks to employees

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees may be comfortable with.

mobile security

One-fifth of IT pros say their companies had mobile data breach

IT pros have long been concerned about the potential for security breaches with BOYD; a new survey indicates they're right to be worried.

byod

BYOD isn’t going away, so set a real strategy

Users are going to use their devices for work, no matter what you do. That’s why you need a policy that manages the considerable risks. (Insider; registration required)

Enterprise Tablet Comparison

Comparing 7 top enterprise tablets

The line between enterprise and consumers devices is thin, but some hybrid-tablets come equipped with more business features than others. Here are the pros and cons of the seven top enterprise hybrids.

router chalkboard

Educational IT crying out for better analytics, BYOD management

A panel discussion at Aruba’s Atmosphere conference this week talked up the need for better analytics and options for managing floods of personal devices on educational networks.

iphone security

iOS 9.3 tells enterprise iPhone users what should be obvious

A new iOS software feature reportedly makes its abundantly clear that iPhones connected to the corporate network are 'supervised' by IT and can be remotely monitored and located.

byod challenges for it leaders

BYOD continues to add challenges for IT leaders

A recent study shows that more workers are turning to personal mobile devices to get work done, but businesses need to consider not only the security threats, but also the effect on company culture.

Load More