• Applying encryption to mobile devices

    How feasible is it to apply encryption to organizational data on mobile devices such as email and other organizational applications? We have a BYOD policy, the question is are we facing any law issues regarding this need mainly in the US and Germany. Thanks.

    OfirNissim5 pointsBadges:
  • Are BYOD programs a security risk?

    According to a recent study by Ovum, 80% of corporate BYOD programs are 'inadequately managed by IT departments.' As more companies allow their staff to use their own computing devices to do work, they're struggling to address the programs that enable corporate control and guidance. How is your...

    Michael Tidmarsh28,395 pointsBadges:
  • Master thesis in BYOD

    I decided to choose BYOD (bring your own device) for my master thesis but I couldn't find any research work (Research Papers) done in this area. Only a lot of articles on the Internet. Please guide me how can I go further? What things should I include in my thesis or for literature survey? OR...

    denialwayne10 pointsBadges:
  • Do you see mobile malware becoming a dangerous trend for BYOD?

    In a recent report, FortiGuard Labs has seen a 30% uptick in mobile malware and is tracking over 250,000 unique malicious Android samples, along with 300 unique malicious Android families. The company says while BYOD is still a fast-growing trend, malware could affect both an employee's device and...

    Michael Tidmarsh28,395 pointsBadges:
  • Should administrators take on the responsibility of BYOD?

    Even if enterprises / corporations don't have an official BYOD program, administrators are beginning to deal with employees accessing corporate data from tablet and smartphones. While it makes sense for admins to take on this mobile responsibility, some are hesitant to fully take on mobile. Should...

    Michael Tidmarsh28,395 pointsBadges:
  • Why are enterprises struggling to set up BYOD policies?

    Despite the continued emergence of BYOD, enterprises are still struggling to tighten up security to protect the corporate networks. According to research by Acronis, 60% of firms have not established a BYOD policy while an overwhelming 80% haven't sat down with employees to discuss the risks...

    Michael Tidmarsh28,395 pointsBadges:
  • Is security the greatest problem with BYOD?

    While most of the discussion of Bring Your Own Device (BYOD) policy centers around security risks that come with giving the employees’ personal devices access to critical data and systems.One aspect of the issue that is not often raised is the potential for lowered productivity as users spend...

    Chris Leonard4,300 pointsBadges:
  • What are your top three BYOD concerns?

    In a recent survey by SearchCompliance, 'security' was cited by an overwhelming 96% of respondents as being among the top concerns regarding BYOD/consumerization of IT. Compliance came in as the second-ranked concern in the survey. That got us thinking...what are your top three BYOD concerns?

    Michael Tidmarsh28,395 pointsBadges:
  • What are your pros and cons of BYOD?

    During this year's Interop conference, many speakers and attendees discussed the pros and cons of BYOD or bring-your-own-device. Gib Sorebo, chief cyber-security technologist at SAIC, said BYOD may seem like a necessity but it's not always the case. What are your pros and cons of BYOD?

    Michael Tidmarsh28,395 pointsBadges:
  • How would you manage your BYOD bandwidth successfully?

    As more companies embrace BYOD policies, the increase in devices can tax networks and complicate bandwidth management. To mange your bandwidth successfully, expert Craig Mathias says to follow these three steps: Manage Policy Regulate bandwidth and shape traffic Manage the whole network Do you...

    Michael Tidmarsh28,395 pointsBadges:
  • Why do you think there’s a renewed interest in UC&C?

    A recent survey by the research firm Ovum confirmed a renewed interest in unified communications & collaboration as over 80% of respondents said they have plans to implement some UC&C in the next two years. Also, 78% claimed to have the dedicated budget to do so. Why do you think there's a...

    Michael Tidmarsh28,395 pointsBadges:
  • How will Facebook Home affect BYOD policies?

    Another headache is brewing for companies trying to establish BYOD policies. Facebook recently announced 'Facebook Home,' an application for Android operating systems that will provide deep Facebook functionality on mobile devices. How will Facebook Home affect BYOD policies? What problems could it...

    Michael Tidmarsh28,395 pointsBadges:
  • Will the iPad ever become a true corporate device?

    One of the main devices driving us into the BYOD era has been the iPad. Many people believe it's destined to populate corporate offices. However, Matthew Oakeley, the head of IT at the management firm Schroders, believes it won't due to its integration issues with Microsoft and the Surface Pro will...

    Michael Tidmarsh28,395 pointsBadges:
  • Are softphones the future of BYOD?

    As more enterprises move into the BYOD era, the term 'softphones' has become a key trait as it allows IT departments to deliver unified communication systems. According to Diane Meyers, an analyst for Infonetics Research, the relationship between a workplace phone extension and a hard phone will...

    Michael Tidmarsh28,395 pointsBadges:
  • What would you rather use: Enterprise or Cloud-based applications?

    As BYOD continues to grow, many enterprises are turning to enterprise app stores instead of cloud-based app stores (Apple and Google) to better control mobile applications. Is this the right direction? What would you rather use: Enterprise or Cloud-based applications?

    Michael Tidmarsh28,395 pointsBadges:
  • Is Blackberry 10 the best choice for enterprise in terms of BYOD?

    Jeff Holleran, Blackberry's senior director of enterprise product management, claims that the new Blackberry 10 operating system in conjunction with the BlackBerry Enterprise Service 10 provides the best mobile and BYOD system for both owners and companies.  Do you think he’s right and do you...

    Chris Leonard4,300 pointsBadges:
  • Do you think SAP Centers of Excellence can help with BYOD?

    As BYOD continues to grow, can SAP fit provide a safe framework for businesses through Centers of Excellence? Can you see a way that IT strategists could use Centers of Excellence to provide the flexibility to adopt mobile-centric rules that provide security to both staff and the company?

    Chris Leonard4,300 pointsBadges:
  • Are you familiar with identity management systems?

    As BYOD becomes more prevalent, some companies have turned to identity management systems to safeguard data and employees. Are you aware of identity management systems? Has your company adopted such software tools?

    Chris Leonard4,300 pointsBadges:
  • How big of a risk is BYOD?

    While more companies are inviting employees to 'bring their own device' to work, many still see BYOD as a potential security risk. According to a recent survey by (ISC)2, 78% of security professionals say the trend presents a 'somewhat' or 'very significant' risk. How big of a concern is BYOD to...

    Michael Tidmarsh28,395 pointsBadges:
  • What are your company’s BYOD practices?

    As more companies begin to deal with BYOD issues and strategies, consumerization expert Cesare Garlati discusses the three key practices in managing a BYOD program. What practices has your company put in to deal with 'bring-your-own-device'?

    Michael Tidmarsh28,395 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following