BYOD: Big security, small devices

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

Enterprises may be ready for BYOD, but most consumer devices aren't, so vendors are adding high-level security features to their new and upcoming product

The analysts have a term for it: BYOD, or "bring your own device." IT managers have their own term for it: Trouble.

Once, mobile devices were exclusively issued -- and managed -- by a company's IT department. With the broadening of the mobile device market -- and with stylish, powerful smartphones and tablets becoming commodity products -- can you blame anyone for wanting to use theirs for work?

[ Learn how to secure and manage workers' smartphones, tablets, and more with InfoWorld's Mobile Device Management (MDM) Deep Dive Report. | Keep up on mobile developments with InfoWorld's Mobilize newsletter. ]

The whole question of how to secure those devices in the first place is a spur for both innovation and controversy. The good news: The most recent wave of mobile devices for the consumer reveals that device makers are conscious of this issue, and turning more attention towards adding enterprise security features. The bad news: There are still plenty of devices in circulation without such security.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Mobile Security Insider: iOS vs. Android vs. BlackBerry vs. Windows Phone
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies