March 29, 2017
Datacastle CEO Ron Faith points out what some businesses are doing wrong when it comes to handling data, and what they should do differently to track and back up endpoints.
January 27, 2017
President Donald Trump is causing quite the stir at the White House as he continues to use his personal smartphone for some purposes. Trump still uses his "old, unsecured Android phone, to the ...
December 20, 2016
Businesses prefer implementing a BYOD model because of user demand, the rising cost of data plans and overage fees, and legal reasons. It may not save IT money, however.
June 14, 2016
Standalone MAM is appealing to businesses because it allows IT to manage content on BYO devices without enrolling them in MDM. More vendors are going after this trend.
BYOD Get Started
Bring yourself up to speed with our introductory content
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
Workers around the world found themselves following Pokémon Go characters into the lunchroom and around their office parks this year. It won't be the last time we see augmented reality technology in the workplace. Manufacturing companies can use augmented reality technology to let workers view blueprints hands-free, for instance, and AR can help others gain powerful insight into how users interact with certain apps. This issue's cover story delves into business uses for AR.
Plus, learn how developers must take browser capabilities into consideration when creating web apps. In this month's Deep Dive, get to know the ins and outs of identity and access management as a service -- a technology that's becoming more critical as users are more tied to their profiles than ever. And in a Q&A with the inventor of the term COPE, learn why businesses should consider the corporate-owned, personally-enabled device model. One such device companies may be adopting is Apple's latest, the iPhone 7, featured in this month's Device Spotlight. Finally, editors look back at the big end-user computing trends of 2016 and peek at what's to come in 2017.Continue Reading
As enterprises expand their mobile footprint, the security risks to their data multiply: an unattended tablet, unsecured Wi-Fi network or malware from a third-party app is all it takes for data loss or a security breach to occur. Protecting just one of these aspects of mobility isn't enough. To address these vulnerabilities, IT executives are now taking a layered approach to mobile security and management. They protect the app layer, for example, with secure containers and the device layer with mobile device management.
In this SearchCIO handbook, Mary K. Pratt lists the tiers of tools and technologies that are increasingly being incorporated into organizations' mobile security strategies. In our second piece, CTO Niel Nickolaisen talks about how delivering good mobile security involves closely examining the risks before heaping on the rules. In our last piece, Features Writer Jason Sparapani catches up with Gartner's Dionisio Zumerle, who talks about how mobile security involves finding a balance between business and user needs.Continue Reading
Evaluate BYOD Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Desktop administrators have been IT department staples for decades, but their jobs and titles are evolving as endpoints move beyond Windows. Continue Reading
Vendors keep hammering the mobile HR message, but organizations are slow to buy into the pitch. One major reason is HR's failure to serve the biggest user base: employees. Continue Reading
In this webcast about mobile computing in business, mobility consultant Bob Egan explains why invisible security works better than its visible counterpart. Continue Reading
Learn to apply best practices and optimize your operations.
The best mobile strategies require careful consideration before IT can implement them. But the right plan can help any organization take advantage of all mobile has to offer. Continue Reading
BYOD disrupted how the IT department managed resources. Now, administrators face a management challenge presented by a new interloper -- Microsoft accounts. Continue Reading
Laptops and phones are critically important in the era of BYOD, but safety can only be achieved with secure mobile device management. Continue Reading
Problem Solve BYOD Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks. Continue Reading
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Continue Reading
An expert offers strategies for securing mobile devices in healthcare settings, including restricting BYOD, personalized training for physicians and ransomware protection tools. Continue Reading