Searching all of TechTarget| 2,475 results for "byod"

Conversations: Is BYOD dead?

See all conversation search results provided by ITKE.

SearchCloudComputing

Manage May 12, 2015

SearchConsumerization

Evaluate May 11, 2015

How to weigh BYOD benefits and risks

Organizations continue to transition to bring your own device programs to improve mobility. Use this guide to help you figure out whether BYOD is right for your enterprise. Continue Reading

MicroscopeUK

By Simon Quicke May 07, 2015

Phoenix warns against BYOD security risks

Staff are not telling their IT departments that they are bringing in their own devices leaving their employers open to security risks Continue Reading

SearchCompliance

Evaluate Apr 13, 2015

Don't let BYOD legal issues sink your BYOD initiative

Companies best be aware of the legal issues that accompany their BYOD initiatives, mobility consultant Bryan Barringer explains in part one of this webcast series. Continue Reading

SearchVirtualDesktop

By Jake O'Donnell News May 14, 2015

GPU virtualization aids app performance, BYOD

A Midwestern college recently added NVIDIA technology to its Citrix environment to enable use of a graphically complex app. Continue Reading

SearchUnifiedCommunications

By Jon Arnold Evaluate May 14, 2015

How challenging is implementing BYOD in a UC environment?

What are some challenges of implementing BYOD in a UC environment? UC expert Jon Arnold explains the three high-level challenges organizations face with BYOD. Continue Reading

SearchCompliance

Manage Apr 13, 2015

BYOD best practices call for mobility governance team

In part two of this webcast series, enterprise mobility expert Bryan Barringer discusses BYOD best practices to confront the challenges that accompany mobility. Continue Reading

SearchSecurity

By Michael Cobb Get Started Apr 10, 2015

How will Android encryption by default affect enterprise BYOD?

Google is beginning to encrypt data by default on its Android devices. Expert Michael Cobb explains how this change will affect enterprise BYOD security. Continue Reading

SearchEnterpriseDesktop

Evaluate Jan 23, 2015

Mobility management evolves into BYOD and beyond

Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud. Once desktop admins get past the ... Continue Reading

dellci2

Sponsored Mar 18, 2015

As BYOD and Mobility Rise in 2015, IT Focuses on Management

The BYOD debate is over—enterprises must deploy or be left behind. Discover how to implement a strategy without falling prey to risks such as data loss and cybercriminals. Continue Reading