• BYOD: data protection and information security issues

    Allowing employees to use their own devices to access company data raises data protection issues that a business must answer

    ITKE409,275 pointsBadges:
  • GPU virtualization aids app performance, BYOD

    A Midwestern college recently added NVIDIA technology to its Citrix environment to enable use of a graphically complex app.

    Jake O'Donnell1,365 pointsBadges:
  • Mobile security strategy matures with BYOD

    The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy.

    Michael Heller2,370 pointsBadges:
  • How to use defence in depth to secure endpoint machines

    Go beyond antimalware deployment to use security policies, BYOD strategies and user education to keep your devices and systems safe

    ComputerWeekly5,245 pointsBadges:
  • Endpoint backup scales past 100,000 with Druva inSync

    Endpoint backup and BYOD data protection specialist Druva re-architects its inSync product to scale past 100,000 users

    Antony Adshead1,680 pointsBadges:
  • New cyberthreats: Defending against the digital invasion

    The confluence of the Internet of Things and bring your own device may turn into a beachhead for attackers.

    JUllrich0 pointsBadges:
  • Ensuring network perimeter security in a perimeterless age

    The increasingly porous enterprise perimeter, challenged by BYOD, private and public Wi-Fi and other access options, makes traditional network perimeter security obsolete.

    SearchEnterpriseWAN1,395 pointsBadges:
  • Managing mobile unified communications in a BYOD environment

    Find out the first steps you should take when managing mobile unified communications in a bring your own device (BYOD) environment.

    PKorzen880 pointsBadges:
  • Top 10 mobile and BYOD stories of 2015

    For mobile device management, 2015 was the year enterprise IT fully embraced the trend for bring your own device (BYOD) programmes

    Cliff Saran3,520 pointsBadges:
  • SN blogs: Android for Work ready for prime time

    In this week's SN blogs, analysts discuss Google's new BYOD platform and give support to user activity monitoring applications.

    Sonia Groff805 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.