- Despite shocks, organisations still not making security a continuous process: Bussiere
- Analysis skills lacking as security data piles up, consultant warns
- Virtual servers still face real security threats
- Is Bring Your Own Identity a security risk or advantage?
- Insecure Connections: Enterprises hacked after neglecting third-party risks
ENABLING BYOD - Why the evolution of VDI has made mobility even more mobile and how to safely incorporate consumer devices in the workplace
The concept of Bring your Own Device or "BYOD" perhaps best represents the combination of consumerisation and pressure from employees to work in a more flexible manner. Clearly, BYOD has a simple appeal for the end user: “I get to use my new smartphone or tablet at work!” What goes through the mind of the typical IT person is much more complex. So what challenges does the IT manager face with the rise of BYOD?
Please supply your email address to access the content.
- Newcastle Council deploys TechnologyOne enterprise solution
- Vodafone re-allocates 850MHz 4G spectrum a week after Telstra and Optus 700MHz launch
- Sitecore tackles Western Australia with Velrada partnership
- Email to make way for automation: KPMG
- Huawei targets European football clubs with FanPlay partnership
- Scott Brinker: Technology is now as much a part of marketing as creative
- Rip Curl rides wearable wave with smartwatch for surfers
- Defending Facebook, OkCupid says it also runs user-behavior tests
- JC Penney: Finding the right customer engagement strategy
- Brands demonstrate a hotchpotch of IT/marketing relationships