March 29, 2017
Datacastle CEO Ron Faith points out what some businesses are doing wrong when it comes to handling data, and what they should do differently to track and back up endpoints.
January 27, 2017
President Donald Trump is causing quite the stir at the White House as he continues to use his personal smartphone for some purposes. Trump still uses his "old, unsecured Android phone, to the ...
December 20, 2016
Businesses prefer implementing a BYOD model because of user demand, the rising cost of data plans and overage fees, and legal reasons. It may not save IT money, however.
June 14, 2016
Standalone MAM is appealing to businesses because it allows IT to manage content on BYO devices without enrolling them in MDM. More vendors are going after this trend.
BYOD Get Started
Bring yourself up to speed with our introductory content
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
Workers around the world found themselves following Pokémon Go characters into the lunchroom and around their office parks this year. It won't be the last time we see augmented reality technology in the workplace. Manufacturing companies can use augmented reality technology to let workers view blueprints hands-free, for instance, and AR can help others gain powerful insight into how users interact with certain apps. This issue's cover story delves into business uses for AR.
Plus, learn how developers must take browser capabilities into consideration when creating web apps. In this month's Deep Dive, get to know the ins and outs of identity and access management as a service -- a technology that's becoming more critical as users are more tied to their profiles than ever. And in a Q&A with the inventor of the term COPE, learn why businesses should consider the corporate-owned, personally-enabled device model. One such device companies may be adopting is Apple's latest, the iPhone 7, featured in this month's Device Spotlight. Finally, editors look back at the big end-user computing trends of 2016 and peek at what's to come in 2017.Continue Reading
Evaluate BYOD Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT pros have to manage application performance across complex networks connecting more devices and locations, as mobility changes how granular performance needs to get. Continue Reading
Enhanced team messaging app security, compliance and analytics could kindle adoption across enterprises. As an example, Cisco Spark just unveiled several updates. Continue Reading
The key to selecting the network security product that will work best for your organization is choosing tools that will work together as a unified security strategy. Continue Reading
Learn to apply best practices and optimize your operations.
An increasingly mobile workforce is compelling enterprises to retool their infrastructure and add new capabilities to their list of mobile network design considerations. Continue Reading
In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against network security threats. Continue Reading
Desktop administrators have been IT department staples for decades, but their jobs and titles are evolving as endpoints move beyond Windows. Continue Reading
Problem Solve BYOD Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Using personal Gmail accounts for business purposes is not a secure enterprise BYOD strategy. Expert Matthew Pascucci discusses why companies should avoid implementing this tactic. Continue Reading
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks. Continue Reading
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Continue Reading