Bring Your Own Device (BYOD) Topic Center
Bring Your Own Device (BYOD) news, in-depth articles and more
Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.
Google has boosted the Android management features in Apps to help IT admins control access to the suite from users' Android smartphones and tablets.
Google could gain a stronger position in businesses by acquiring Divide, an enterprise software company focused on the bring-your-own-device to work model.
After encountering problems last year selling its newest smartphones, BlackBerry has shifted to a stronger focus on the enterprise, especially through distribution of its BlackBerry Enterprise Service 10 mobility management client software.
Samsung has made the second version of its Knox data and app security platform available worldwide, but at first only users and enterprises that have the new Galaxy S5 can take advantage of the improvements it offers.
Samsung is deploying Knox, its secure platform for mobile devices, to earn the trust of the IT departments that run BYOD programs.
Aruba Networks announced a package of software upgrades designed to better accommodate all-wireless workplaces, including sites where it's common to see employees using three different mobile devices with multiple applications.
The bring-your-own-device trend will only get more nerve-wracking for IT managers in 2014 because of the 30% annual growth expected for smartphones purchased under a BYOD approach, and the further emergence of Windows Phone as a third platform behind Android and iOS.
Amid the clamor of "bring your own device" (BYOD), a question lurks in the background: "What happens to technical service and support?" Concerns for the tech support function encompass the extremes, from agents being overwhelmed with calls, to their becoming inhabitants of a help desk ghost town.
Just when IT execs are getting a handle on how to accommodate employees' personal smartphones and tablets in the workplace, the technology industry has thrown up a new challenge -- wearable computers.
Four companies that have been at BYOD for a while talk about how their programs have changed with the times. One key takeaway: Don't expect to save bundles of money. Insider (registration required)
There are several deployment choices, but none is overly complex to set up.
Earlier this week, some iOS device owners woke up to discover that "Oleg Pliss" had hacked their iPhones and iPads and locked them up. The hack could have been worse, says Ryan Fass, which is why it's a good lesson in security that IT staffers should use.
Marketers will want to use tools like Snapchat's Here feature to bend consumers to their will. IT has to inject rationality into the resulting discussions.
National correspondent Julia King reports the mood is feisty at this year's CITE Conference & Expo.
Implementing WAP involves a lot of moving pieces; here's what admins need to know for a successful rollout.
Work Folders, new to Windows Server 2012 R2, helps administrators manage user-created data in a BYOD environment.
IT will benefit from BYOD if it has clear policies that limit its involvement in support. (Insider; registration required)
For generations, office ergonomics involved various measures intended to keep employees productive while they remained in their chairs. New thinking and new devices are changing all that.
Premier 100 IT Leader Sonya Christian also answers questions on career paths.
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Confront consumerization with convergence
- Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Securing BYOD
- Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
- This white paper explains how Dell Mobility Solutions for security can help protect your organization's data, simplify administration and support forward-thinking mobility initiatives.
- Enabling devices and device management for your mobility/BYOD program
- In this white paper, learn how to select the right mobile devices for your organization and manage them with efficiency, flexibility and security...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context
- This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise. All Bring Your Own Device (BYOD) White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Bring Your Own Device (BYOD) Webcasts