March 29, 2017
Datacastle CEO Ron Faith points out what some businesses are doing wrong when it comes to handling data, and what they should do differently to track and back up endpoints.
January 27, 2017
President Donald Trump is causing quite the stir at the White House as he continues to use his personal smartphone for some purposes. Trump still uses his "old, unsecured Android phone, to the ...
December 20, 2016
Businesses prefer implementing a BYOD model because of user demand, the rising cost of data plans and overage fees, and legal reasons. It may not save IT money, however.
June 14, 2016
Standalone MAM is appealing to businesses because it allows IT to manage content on BYO devices without enrolling them in MDM. More vendors are going after this trend.
BYOD Get Started
Bring yourself up to speed with our introductory content
Organizations are recognizing the need for network access control systems, but it is important to evaluate and perform research before you invest in enterprise NAC products. Continue Reading
Allowing employees to use their own devices for business purposes offers flexibility and convenience, but hospitals must take appropriate measures to secure health data. Continue Reading
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
Evaluate BYOD Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The growth in devices on the network has heightened the need for network access control products. This article presents scenarios where an enterprise might need an NAC system. Continue Reading
Enterprises should consider pressing 4G vulnerabilities when developing a BYOD strategy for their employees. Expert Judith Myerson explains the flaws and what to do about them. Continue Reading
The workforce is evolving as organizations focus their efforts on digital transformation strategies. New approaches to technology are influencing employee productivity and collaboration. Five key ... Continue Reading
Learn to apply best practices and optimize your operations.
This mobile security requirements checklist outlines the vital steps for information security professionals to follow to improve mobile security in their companies. Continue Reading
Keeping your Wi-Fi secure is a challenge, to say the least. Security hasn't kept up with Wi-Fi advances, but there are steps you can take to keep your Wi-Fi network protected. Continue Reading
Employees want their BYOD -- and BYOA, BYOC and BYON. Organizations may be willing to embrace the BYOx movement, but IT may not. Get answers to your burning BYOx questions. Continue Reading
Problem Solve BYOD Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Using personal Gmail accounts for business purposes is not a secure enterprise BYOD strategy. Expert Matthew Pascucci discusses why companies should avoid implementing this tactic. Continue Reading
As freeing as BYOD can be for employees, it can mean more headaches for IT. Organizations need a BYOD policy and EMM strategy to help IT mitigate BYOD security risks. Continue Reading
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Continue Reading