Searching all of TechTarget| 2,270 results for "byod"

Conversations: Is BYOD dead?

See all conversation search results provided by ITKE.

SearchSecurity

Get Started Dec 02, 2013

From ABCs to BYOD

Security 7 Award winner Phil Scrivano heads a BYOD program for the 17 public schools in Los Angeles County, securing network access from kindergarten on up. Continue Reading

SearchSecurity

By Lisa Phifer Evaluate Jan 28, 2013

BYOD security strategies: Balancing BYOD risks and rewards

Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies. Continue Reading

SearchCIO.in

Problem Solve Jul 10, 2012

BYOD cost optimization: Get the most out of your BYOD program

The BYOD cost vs. savings equation is a complex one to balance. This tip explores how to best optimize costs involved in your BYOD initiative. Continue Reading

ComputerWeekly

Apr 30, 2014

BYOD and the issue of privacy

Computer Weekly discusses the issue of BYOD and privacy with MobileIron and law firm Bircham Dyson Bell Continue Reading

SearchMobileComputing

By Michael Brandenburg Jul 15, 2011

Bringing BYOD to your enterprise

Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed. Continue Reading

MicroscopeUK

By Simon Quicke Jul 19, 2013

Acronis warns against BYOD denial

Acronis has urged resellers to help a significant number of customers who are in denial about the need to react to the BYOD trend Continue Reading

SearchCloudComputing

By Tom Nolle Problem Solve Oct 26, 2012

Optimizing the cloud for the BYOD movement

Supporting mobile devices in a cloud environment can be a headache, but it's not impossible. Develop processes to successfully marry BYOD and cloud. Continue Reading

ComputerWeekly

By Cliff Saran Dec 14, 2012

There is more to IT than BYOD

CIOs should stop worrying about BYOD according to analyst Gartner. Instead they should focus on technology transformation. Continue Reading

SearchCIO

Manage Mar 17, 2014

The four cornerstones of a successful BYOD program

A BYOD security policy is one cornerstone of a successful BYOD program. Learn why flexibility is also crucial to BYOD success, in this webcast series. Continue Reading

SearchCIO.com.au

Aug 04, 2011

Giving users choice - telecommuting and BYOD

Telecommuting and BYOD are two sides of the same coin of opportunity Continue Reading