Concerned about the security risks of BYOD, Toronto-based Canadian Tire has decided to issue its 3,000 employees corporate-owned BlackBerry 10 devices, according to a report by Computerworld .
While 61 percent of small and medium-sized businesses (SMBs) have implemented a BYOD policy, only 37 percent are managing or plan to manage those devices usin a mobile device management (MDM) product, according to a survey of 991 SMB IT professionals conducted by Spiceworks and sponsored by MDM firm Fiberlink.
IT managers spend many sleepless nights worrying about the security risks being introduced by employees who bring their own devices. And a new report from F-Secure showing a marked rise in Android malware is not going to help them sleep any better.
Most companies in China are in the early stages of BYOD adoption, judged Forrester analyst Wen Zhao.
LAS VEGAS--BYOD presents enterprises with a number of security and privacy challenges that must be addressed, Gib Sorebo, chief cybersecurity technologist at research firm SAIC, told an audience here at Interop on Thursday. Sorebo related that nearly two-thirds of organizations do not enforce encryption policies, which opens up corporate data to risk of unauthorized disclosure.
During his Interop keynote address on Wednesday, Rob Soderbery, Cisco's senior vice president and general manager for the Enterprise Networking Group, unveiled the results a survey of 1,300 IT professionals. It found that 41 percent of respondents said their networks were not ready to support BYOD, despite deploying more applications than a year ago.
Gatwick Airport, London's second largest airport next to Heathrow, has enabled BYOD and the cloud, and is saving money on servers in the process.
BYOD is often seen as a way for enterprises to save money in mobile device and equipment costs. But there are many costs that come with adopting BYOD, and not all of them are obvious to those tasked with designing and implementing a BYOD program.
When it comes to BYOD, a major concern of IT managers is data security on personally owned mobile devices. Some firms are looking at apps like the Snapchat as a model for corporate data security.
As cybersecurity threats mount, enterprises are scrambling to find ways to protect their networks and data. One tried and true security approach, known as identity and access management (IAM), enables firms to secure corporate networks, applications and data while enabling BYOD and cloud computing