SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Bring Your Own Device (BYOD) stories - Page 12

One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Story image
Want to use Apple at your school? JAMF offers solution for full integration
Mon, 23rd May 2016
#
mdm
#
personal computing devices
#
schools
School networks can often be confined to the devices they use due to minor contingencies. Fortunately, this is soon to change.
Story image
Labour slams controversial 100k BYOD donation
Tue, 17th May 2016
#
personal computing devices
#
byod
#
labour party
The Labour Party is accusing the Govt of ignoring inequalities caused by BYOD after a controversial 100k donation to Wakatipu High School.
Story image
Has IoT increased our exposure to cyber threats?
Thu, 12th May 2016
#
mdm
#
iot
#
cybersecurity
Cybersecurity is already top of the agenda for many corporate boards, but the scale and scope of the Internet of Things escalates security risk.
Story image
Apple devices top choice for employees, survey finds
Fri, 15th Apr 2016
#
mdm
#
smartphones
#
personal computing devices
The majority of employees choose Apple’s Mac and iPhone to do their work, thanks to greater ease of use and familiarity, according to a new survey.
Story image
WLAN is more popular than ever, but is it being implemented correctly?
Thu, 14th Apr 2016
#
iot
#
smartphones
#
wireless networks
Wireless communications are becoming more important, so it's crucial to design and implement WLANs properly, says Wavelink.
Story image
How can you best manage Apple devices at your organisation?
Mon, 11th Apr 2016
#
mdm
#
personal computing devices
#
it managers
Organisations are realising the potential that Mac brings to their employees by giving them the freedom to use the tools they already know and love.
Story image
Cybersecurity remains biggest barrier to BYOD adoption
Fri, 1st Apr 2016
#
dlp
#
cybersecurity
#
personal computing devices
Cybersecurity fears loom as BYOD popularity surges, with 1 in 5 firms facing mobile breaches, straining IT teams.✓.
Story image
Under-penetrated verticals offering huge MDM potential; will Microsoft shake up EMM?
Wed, 23rd Mar 2016
#
mdm
#
personal computing devices
#
frost & sullivan
The Australian MDM market is offering growth and 'significant' opportunities for the channel, while there could be a shakeup ahead for the EMM market.
Story image
Network security market grows rapidly in APAC region
Thu, 17th Mar 2016
#
network infrastructure
#
sdn
#
naas
High adoption of BYOD policies and cloud computing in the APAC region will aid the growth of the global network security market through to 2019.
Story image
Analyst Opinion: Coming to a device near you – the enterprise digital workplace
Fri, 11th Mar 2016
#
cx
#
martech
#
personal computing devices
Persistent and rewarding customer experiences are designed, delivered, and managed using enterprise software and line-of-business applications.
Story image
Consumer-grade enterprise applications in hot demand
Wed, 9th Mar 2016
#
personal computing devices
#
apps
#
byod
Businesses are investing in usability for B2B applications due to their value in effectiveness, says UXC Keystone.
Story image
Brennan IT solution wins superannuation industry award
Wed, 2nd Mar 2016
#
uc
#
dr
#
mdm
An IT solution by Brennan IT and Local Government Super has won an Excellence award from the Australian Institute of Superannuation Trustees.
Story image
Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation’s data in a world where your employees, contractors and partners are working on mobile devices?.
Story image
What are the downsides to BYOD in the enterprise?
Wed, 24th Feb 2016
#
personal computing devices
#
byod
#
mobility
BYOD policies can boost productivity, but businesses must be aware of the downsides, including employee lawsuits and technical issues.
Story image
Fortinet: The case for internal firewalls
Thu, 18th Feb 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet protects data from attacks originating inside the datacentre, as today it is not enough to protect against just external intruders.
Story image
New case study reveals benefits of BYOD collaboration in schools
Tue, 16th Feb 2016
#
personal computing devices
#
uc
#
collaboration
BYOD programmes in classrooms are benefiting students, as they adapt learning to the increasingly mobile nature of technology.
Story image
VPN and BYOD: what are the risks?
Tue, 9th Feb 2016
#
vpns
#
personal computing devices
#
byod
Tech-savvy employees setting up their own VPNs can pose security risks for organisations, warns NETSCOUT's Fluke Networks.
Story image
Are smartphones distracting our students?
Thu, 4th Feb 2016
#
smartphones
#
edutech
#
personal computing devices
Personal devices are being banned in classrooms due to teacher’s fears they are distracting, although many recognise they will be central to learning.
Story image
Is BYOD in the classroom too much of a distraction?
Mon, 18th Jan 2016
#
personal computing devices
#
byod
#
mobility
A new study has revealed some teachers are banning personal devices for fear of distraction, despite recognising they may be central for learning.
Story image
The Year of Mobile Collaboration: What to Expect in 2016
Tue, 22nd Dec 2015
#
personal computing devices
#
byod
#
cloud services
In 2016, expect mobile collaboration to transform work, driving success with secure cloud tech and BYOD growth.