Bring Your Own Device (BYOD)

September 14, 2012 in Enterprise Mobility by Anne

Bring Your Own Device (BYOD)

1.  Three BYOD approaches — and the budget impact

Love it or hate it, BYOD is likely already affecting security, network performance and your budget (it can drive up costs by more than a third, according to some researchers). Here are three approaches to address these challenges.  Being frugal is one option.  IT departments “secure” their network by isolating devices to a separate VLAN, outside the corporate network.  Another approach is to spend on mobile management capabilities.  This works best for larger businesses or public companies that mustmeet compliance regulations…

2. BYOD? Anti-eavesdropping device stops technical espionage

Technical surveillance counter-measure experts know all about espionage threats and how to prevent sensitive information from getting into the wrong hands; Before adopting  BYOD (Bring Your Own Device), companies need to do a risk assessment. Both corporate America and the U.S. government face increasing technical espionage threats via compromised mobile devices carried into offices, board rooms, and

3.  Costly BYON Complicates BYOD Movement, Survey Says

We are no longer stuck in cubicles but are working more.  Bring your own network (BYON) …workers use their personal devices on various non-vetted networks…Unfortunately, IT policies haven’t kept up with the bring-your-own-device (BYOD) trend. Some IT departments haven’t figured out, for instance, how to get remote wipe onto smart phones, and that is the most basic form of security. According to a new

4.  Privacy, Equity, and other BYOD Concerns

In middle school, not having a tablet/device and having to rely on classmates to share with can be uncomfortable…Can these situations be turned into teachable moments? As the Bring Your Own Device movement continues to gain momentum, allowing students to use their own devices (mobile phones, laptops, tablets) in school, administrators and educators are figuring out how to iron out concerns and issues that crop up.

5.  Work Out Your BYOD Policy With This Chart

As Tesar pointed out BYOD,policies essentially fall into four categories: allowing any device but not connecting it to work applications (on your own), being allowed to connect devices to specific services (bring your own), allowing choice from a