! Here are the latest Insider stories.
Fighting ransomware: A fresh look at Windows Server approaches
8 free virtual appliances you’ll love
4 top disaster recovery packages compared
Microsoft Word vs. Google Docs: Which works better for business?
Suggestions for you
All Application Development
All Cloud Computing
Internet of Things
All Operating Systems
See All Technologies
BYOD news, analysis, research, how-to, opinion, and video.
The new BYOD backlash hides an ulterior motive
FBI backdoors force a rethink of BYOD
Slack + Skype: The fine line between convenience and coercion
Bring-your-own technology doesn't work so well in collaboration or when forced on users
Containerization moves beyond the full erase
The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security
Best Practices For Making BYOD Simple and Secure
Discover how to select technologies and develop policies for your BYOD program.
Half of U.S. businesses have no formal BYOD policy for security
Emergence of biometric smartphone security is rare, survey finds
Microsoft's Surface Pro 4, the tablet that can finally replace your laptop
With the Surface Pro 4, Microsoft builds on the previous generations of the Surface line, getting them closer than ever to their goal of creating a tablet that will replace your laptop.
BYOD is as entrenched (and complicated) as ever
The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.
IBM tackles shadow IT with a new cloud security tool
Hosted on IBM Cloud, Cloud Security Enforcer can scan a corporate network, find the apps employees are using, and provide a more secure way to access them
Buyer's Guide to Enterprise File Sync and Share
As an IT professional, you understand sync and share software is a growing part of today's workflow-but the workers you support consider it essential to their daily activity.
5 ways to shore up security in your BYOD strategy
Many security leaders are still wary about BYOD. Here are five ways to combine security and privacy
Split your smartphone bill -- but beware the risks
Hidden costs and technology limitations can vaporize your savings -- and breed unhappiness
IDC cuts forecast for mobile management software sales
Sales of mobile management software are expected to slow, but will still top $2.9 billion in 2019
The messy truth about BYOD
It's jeopardizing your business! It's already a passing fad! It's the standard in business today! Why the claims don't add up
Enterprise-Ready Sync From Day 1
There's no doubt consumer-grade sync and share solutions are convenient, but it's the risk they introduce to the enterprise that keeps IT leaders up at night.
Google IDs are creeping into your identity management
Microsoft and Google are both expanding their policy management tools' reach, and IT may be caught in the middle
How IT can manage the Apple Watch
There's only one explicit Apple Watch MDM policy, but more controls than you might realize
4 barriers blocking enterprise adoption of Android
The fact remains: iPhones and iPads are a better fit for business use than even the best Android devices
Hillary Clinton's email problem is everyone's problem
The mixing of work and personal lives, legitimate needs for secrecy, and 24/7 availability combine to create a challenge every company faces
File Sync and Share Made Simple
Today's employees use multiple devices to get their work done. These mixed environments create new challenges for IT teams-IT admins are now tasked with providing users access to synced and shared files on any platform, any device and
Samsung's security twist: Protect yourself from IT
Walling off corporate data with from personal data via My Knox protects IT from you -- and vice versa
A big step for BYOD: Separate billing for smartphones is finally here
AT&T Work Platform is a major step toward separating work and personal communications in a sensible way
BYOD? Start here: A draft reimbursement policy for mobile users
Many companies still struggle with reimbursement and access policies for employees on the go
You Might Also Like
10 Reasons to Upgrade to Veritas Backup Exec 16
Benefits of As-a-Service Models for Branch Infrastructure
Big Data for Good: Using Data & Analytics to Benefit Society (And Make Money)
Employee Choice Programs
On Demand Webinar: Actionable Network Intelligence Drives Digital Business
Popular on InfoWorld
The new BYOD backlash hides an ulterior motive
Where do you stack up with your IT counterparts on cloud investment?
This ad will close in 20 seconds. Continue to site »