• Four keys to implementing a cloud file-sharing policy in the BYOD era

    Cloud admins must balance securing content with on-demand access for users, or users will flout the file-sharing policy.

    SearchCloudComputing4,660 pointsBadges:
  • Mobile security strategy matures with BYOD

    The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy.

    Michael Heller2,500 pointsBadges:
  • Can a tablet security policy help protect enterprise users?

    BYOD isn't a new trend, but tablet security policy is increasingly important as users choose them over laptops for work. Expert Mike O. Villegas discusses tablet security policies.

    searchsecurity25,770 pointsBadges:
  • BYOD: data protection and information security issues

    Allowing employees to use their own devices to access company data raises data protection issues that a business must answer

    ITKE413,620 pointsBadges:
  • GPU virtualization aids app performance, BYOD

    A Midwestern college recently added NVIDIA technology to its Citrix environment to enable use of a graphically complex app.

    Jake O'Donnell1,365 pointsBadges:
  • How to use defence in depth to secure endpoint machines

    Go beyond antimalware deployment to use security policies, BYOD strategies and user education to keep your devices and systems safe

    ComputerWeekly5,395 pointsBadges:
  • Endpoint backup scales past 100,000 with Druva inSync

    Endpoint backup and BYOD data protection specialist Druva re-architects its inSync product to scale past 100,000 users

    Antony Adshead1,725 pointsBadges:
  • New cyberthreats: Defending against the digital invasion

    The confluence of the Internet of Things and bring your own device may turn into a beachhead for attackers.

    JUllrich0 pointsBadges:
  • Ensuring network perimeter security in a perimeterless age

    The increasingly porous enterprise perimeter, challenged by BYOD, private and public Wi-Fi and other access options, makes traditional network perimeter security obsolete.

    SearchEnterpriseWAN1,415 pointsBadges:
  • Managing mobile unified communications in a BYOD environment

    Find out the first steps you should take when managing mobile unified communications in a bring your own device (BYOD) environment.

    PKorzen905 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.