Home Tags BYOD

Tag: BYOD

Bring your own device (BYOD)—also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own Personal Computer (BYOPC) refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications. BYOD usage is primarily driven by perceived enjoyment. The phenomenon is commonly referred to as IT consumerization.

BYOD is making significant inroads in the business world, with about 75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets already using their own technology at work. Surveys have indicated that businesses are unable to stop employees from bringing personal devices into the workplace. Research is divided on benefits. One survey shows around 95% of employees stating they use at least one personal device for work.

Netflix Stethoscope gives users a BYOD security checkup

Medical professionals use stethoscopes to help diagnose problems inside the body. With Netflix's newly open-sourced Stethoscope web application, users receive a security checkup for...

Apple to start assembling iPhones in Bangalore by April

Apple plans to start assembling the iPhone in Bangalore by end April under a contract manufacturing arrangement with Taiwan’s Wistron.The move by the company...

Mobile is still the safest place for your data

When I talk to IT managers, I almost always hear fears of mobile devices as conduits for sensitive corporate data to leave the company.I...

Security Provider Arxan Buys Apperian for Mobile Expertise

Arxan is adding much-needed mobile security management capabilities.Apperian's platform provides granular security and policy controls at the application level. Arxan Technologies, a provider of application...

Data breaches through wearables put target squarely on IoT in 2017

Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed.Drop the mic—enough said. With the sheer...

Windows 10 Creators Update steps up your security response

With the current Windows Insider cycle previewing the Creators Update for Windows 10, Microsoft has started talking about what it’s going to mean for...

Resilient Network Systems Unveils Automated IAM System

This identity access package not only uses multi-factor authentication abut also pulls in data from social networks and other public sources to zero in...

SpeedCast Introduces SIGMA Net

A new standard in cloud-based vessel management with security by designSydney, Australia, November 30, 2016 - SpeedCast International Limited (ASX: SDA), a leading global...

How Do You Protect Your Perimeter When You’ve Blown it to...

By Ian Kilpatrick, Executive Vice President Cyber-Security, Nuvias Group and Chairman Wick Hill GroupIn 2016, we are subject to near constant headlines detailing the...

Good luck securing ‘things’ when users assume ‘stuff just works’

Making devices secure by design requires more effort than vendors currently allow At the end of April my home was broken into by a professional...

Pokémon GO or No Go? Mobile Games May Pose More Risks...

Many mobile games can access sensitive functions and data on employer-issued devices including SMS, social networking, location services & tracking and calendar accessMaidenhead, U.K....

WatchGuard Takes Guesswork Out of Wi-Fi Security With Cloud-based Solution

WatchGuard Wi-Fi Cloud delivers automated wireless threat prevention with interactive engagement and analytics18 October 2016 – WatchGuard® Technologies has announced WatchGuard Wi-Fi Cloud, a...