BYOD

BYOD news, analysis, research, how-to, opinion, and video.

thinker questions deep thoughts
Laptop business user dark office

apps and data representations being erased from a chalkboard

Containerization moves beyond the full erase

The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security

byod security

Half of U.S. businesses have no formal BYOD policy for security

Emergence of biometric smartphone security is rare, survey finds

video

Microsoft's Surface Pro 4, the tablet that can finally replace your laptop

With the Surface Pro 4, Microsoft builds on the previous generations of the Surface line, getting them closer than ever to their goal of creating a tablet that will replace your laptop.

byod keyboard bring your own device mobile

BYOD is as entrenched (and complicated) as ever

The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

cloud apps security IBM

IBM tackles shadow IT with a new cloud security tool

Hosted on IBM Cloud, Cloud Security Enforcer can scan a corporate network, find the apps employees are using, and provide a more secure way to access them

man texting

5 ways to shore up security in your BYOD strategy

Many security leaders are still wary about BYOD. Here are five ways to combine security and privacy

telecoms money cash smartphones carriers

Split your smartphone bill -- but beware the risks

Hidden costs and technology limitations can vaporize your savings -- and breed unhappiness

mdm

IDC cuts forecast for mobile management software sales

Sales of mobile management software are expected to slow, but will still top $2.9 billion in 2019

stolen smartphones mobile

The messy truth about BYOD

It's jeopardizing your business! It's already a passing fad! It's the standard in business today! Why the claims don't add up

retinal identity scan 42 15483589

Google IDs are creeping into your identity management

Microsoft and Google are both expanding their policy management tools' reach, and IT may be caught in the middle

apple watch calls time on apple retail

How IT can manage the Apple Watch

There's only one explicit Apple Watch MDM policy, but more controls than you might realize

Hurdles for track and field exercises    177279837

4 barriers blocking enterprise adoption of Android

The fact remains: iPhones and iPads are a better fit for business use than even the best Android devices

Hillary Clinton checking email on a BlackBerry

Hillary Clinton's email problem is everyone's problem

The mixing of work and personal lives, legitimate needs for secrecy, and 24/7 availability combine to create a challenge every company faces

security protection defending shield soldier battle warrior

Samsung's security twist: Protect yourself from IT

Walling off corporate data with from personal data via My Knox protects IT from you -- and vice versa

Three business users with mobile devices smartphones

A big step for BYOD: Separate billing for smartphones is finally here

AT&T Work Platform is a major step toward separating work and personal communications in a sensible way

iphone money primary

BYOD? Start here: A draft reimbursement policy for mobile users

Many companies still struggle with reimbursement and access policies for employees on the go

Cheapest tablets pose biggest security risks for enterprises

Kohl's special Black Friday deal tablet includes a security backdoor and four major vulnerabilities

seamless security

How to create seamless mobile security for employees

If your organization’s security procedures are disruptive and clunky, frustrated employees will figure out how to get around them. Here’s how three companies created a secure and seamless experience for end users.

Load More