BYOD: Big security, small devices
- 10 July, 2012 15:38
The analysts have a term for it: BYOD, or "bring your own device." IT managers have their own term for it: Trouble.
Once, mobile devices were exclusively issued -- and managed -- by a company's IT department. With the broadening of the mobile device market -- and with stylish, powerful smartphones and tablets becoming commodity products -- can you blame anyone for wanting to use theirs for work?
The whole question of how to secure those devices in the first place is a spur for both innovation and controversy. The good news: The most recent wave of mobile devices for the consumer reveals that device makers are conscious of this issue, and turning more attention towards adding enterprise security features. The bad news: There are still plenty of devices in circulation without such security.
Join the Computerworld Australia group on Linkedin. The group is open to IT Directors, IT Managers, Infrastructure Managers, Network Managers, Security Managers, Communications Managers.
- Leading Through Connections – Insights from the Global Chief Executive Officer Study
- Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
- Devising a Server Protection Strategy with Trend Micro
- Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
- Real-Time Protection Against Malware Infection
Australia lags Mongolia in Internet speeds
40 years ago, Ethernet's fathers were the startup kids
Windows 8 won't hit critical mass in enterprises, Forrester says
Dell replays Windows 8 blame card as PC sales slide
Optus launches 4G TD-LTE in Canberra