Topic:

BYOD and mobile management

Latest Headlines

Latest Headlines

First steps to a secure BYOD program

Organizations continue to embrace BYOD practices in large numbers, but many fail to put key safeguards in place to keep data and networks secure.

Lack of trust continues to vex BYOD programs, survey finds

One of the longstanding impediments to getting a BYOD program off the ground is lack of trust between employer and employee. Even with wide recognition of BYOD as a valid mobile effort, the most well thought-out and structured programs will be derailed if employees don't trust their organizations and adopt the strategy.

News Scan: Curved displays and smartphone innovation; Medical ID in iOS 8 could be life saver; more

Check out the hottest mobile IT news for Sept. 22, including how the curved display will affect mobile devices, why iOS 8 and its medical history function could come in handy, the shuffling of the C-suite at Oracle, beacon messaging and its effect on app users and the security strength brought along by BYOx.

More enterprises are using selective wiping to protect corporate data, employee privacy

More enterprises are using selecting wiping of mobile devices as a way to protect corporate data while safeguarding employee privacy, according to a study by Fiberlink, IBM's mobile device management unit.

5 factors managers need to consider in managing remote workers

More and more employees are doing their work outside of the traditional office. This can increase employee satisfaction, but it presents challenges to managers who must manage a dispersed workforce.

Telecommuters want to be 'good citizens' at work, study finds

Telecommuters can be more productive and are willing to go the extra mile to be good "corporate citizens," according to a new study by a group of academic researchers.

Samsung says to employees: Go around your admin and deploy KNOX yourself

In an apparent effort to encourage employees to go around their IT admin, Samsung is making its KNOX mobile security platform available for free directly to enterprise users who have a Samsung Galaxy S5 or a Samsung Note 4 and have access to a Microsoft Exchange ActiveSync account, the company announced on its blog.

Remote-wipe BYOD policies have potential to backfire

Simply wiping things clean may work wonders for your kitches appliances, but it is a crude--at best--policy for mobile device security.

News Scan: AT&T, Shell ink mobile UC deal; Smartwatch market to take off; more

Check out the hottest mobile IT stories for Wednesday, Sept. 17, including AT&T and Shell's mobile UC platform deal, Gartner's prediction for the smartwatch and wristband market to "take off," mobile intelligence startup AdBrain launches Synapse platform, financial sector in Middle East to invest heavily in mobile and Chinese spending on commercial fleet telematics to increase.

Is containerization the best approach to BYOD security?

Containerization, which separates corporate and personal data on a BYOD device, is one approach that enterprises are taking to provide security in a BYOD environment. But is it the best approach to BYOD security?