BYOD

BYOD | News, how-tos, features, reviews, and videos

byod mobile unified smart home web design
happy employee selects the happiness emoji button to indicate job satisfaction

03 emm

Not your father's cybersecurity

Managing mobile devices in a threat-based environment.

03 crimeware

Why are USB sticks wrinkle-free?

Roughly half of lost USB sticks and other mobile gadgets get returned to owners, which triggers the million-dollar question: What happens to the other half?

handsome male executive holding finger up to be quiet keep a secret

5 ways to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?

Samsung Galaxy S8 and S8+ smartphones

Samsung targets the enterprise with Galaxy S8 and S8+

The Samsung Galaxy S8 and S8+ are two stunning devices for consumers, but business users and IT departments will find a lot to love about the new smartphones, too.

01 intro byod

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

BlackBerry KeyOne smartphone merc_11_onwhite

Back to the future: BlackBerry KEYone launches with physical keyboard

Under a licensing deal with BlackBerry, TCL Communication of China announced another physical keyboard smartphone model called the BlackBerry KEYone.

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

person smartphone office table byod roaming

Forget the network perimeter, say security vendors

Security vendors start embracing Google's BeyondCorp network security model that treats all apps and devices as being on the Internet instead of assigning higher trust to local networks.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

mobile business

Uniting the digital enterprise

Enterprise mobility management isn’t just for mobile devices and applications anymore.

5 handy mobile dropbox tips comment on a file 3

Employees feel pressure to use personal smartphones at work

Businesses are encouraging employees to use personal devices for work purposes, but according to a recent survey, without a proper BYOD strategy and reimbursement plan in place, it might be decreasing productivity.

apple mac macbook

IBM, LEGO offer Macs as recruiting tool

In a tight labor market, employers aim to differentiate themselves on multiple fronts, including tech.

Bring your own device to

How to implement an effective BYOD policy

Companies have accepted that BYOD is a reality. The challenge now is striking a balance between security and flexibility.

Load More