BYOD news, analysis, research, how-to, opinion, and video.

byod security

byod keyboard bring your own device mobile

BYOD is as entrenched (and complicated) as ever

The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

cloud apps security IBM

IBM tackles shadow IT with a new cloud security tool

Hosted on IBM Cloud, Cloud Security Enforcer can scan a corporate network, find the apps employees are using, and provide a more secure way to access them

man texting

5 ways to shore up security in your BYOD strategy

Many security leaders are still wary about BYOD. Here are five ways to combine security and privacy

telecoms money cash smartphones carriers

Split your smartphone bill -- but beware the risks

Hidden costs and technology limitations can vaporize your savings -- and breed unhappiness


IDC cuts forecast for mobile management software sales

Sales of mobile management software are expected to slow, but will still top $2.9 billion in 2019

stolen smartphones mobile

The messy truth about BYOD

It's jeopardizing your business! It's already a passing fad! It's the standard in business today! Why the claims don't add up

retinal identity scan 42 15483589

Google IDs are creeping into your identity management

Microsoft and Google are both expanding their policy management tools' reach, and IT may be caught in the middle

apple watch calls time on apple retail

How IT can manage the Apple Watch

There's only one explicit Apple Watch MDM policy, but more controls than you might realize

Hurdles for track and field exercises    177279837

4 barriers blocking enterprise adoption of Android

The fact remains: iPhones and iPads are a better fit for business use than even the best Android devices

Hillary Clinton checking email on a BlackBerry

Hillary Clinton's email problem is everyone's problem

The mixing of work and personal lives, legitimate needs for secrecy, and 24/7 availability combine to create a challenge every company faces

security protection defending shield soldier battle warrior

Samsung's security twist: Protect yourself from IT

Walling off corporate data with from personal data via My Knox protects IT from you -- and vice versa

Three business users with mobile devices smartphones

A big step for BYOD: Separate billing for smartphones is finally here

AT&T Work Platform is a major step toward separating work and personal communications in a sensible way

iphone money primary

BYOD? Start here: A draft reimbursement policy for mobile users

Many companies still struggle with reimbursement and access policies for employees on the go

Cheapest tablets pose biggest security risks for enterprises

Kohl's special Black Friday deal tablet includes a security backdoor and four major vulnerabilities

seamless security

How to create seamless mobile security for employees

If your organization’s security procedures are disruptive and clunky, frustrated employees will figure out how to get around them. Here’s how three companies created a secure and seamless experience for end users.

Managing BYOD expenses: How to get it right

BYOD programs haven't always saved money. But, handled correctly, they can

MDM mobile devices smartphone

Okta focuses MDM on users, not devices

Identity-management outfit Okta is prepping a mobile device management solution that puts users first in both its design and licensing

HP's cloud-based service protects BYOD mobile devices and PCs

HP Touchpoint Manager is geared for small businesses, with plans starting at $2 per month

Load More