Led by the popularity of its iPhone 6 phones, Apple's iOS devices are dominating mobile device activations in the enterprise, according to data compiled by Good Technology from its enterprise mobility platform.
While many IT departments are dreading the flood of personal wearables into the workplace, it's a worry they probably won't need to address for many years. More immediately, wearables will come into the enterprise as devices specifically built for that environment. Think Microsoft's HoloLens, not Apple Watch.
Shake, a New York-based startup that provides a mobile legal technology platform for freelancers and small businesses, is now targeting enterprises with its Shake Pro product unveiled on Wednesday.
If you are an enterprise with at least 2,000 mobile devices on your network, there is a 50:50 chance that you have at least six of those devices infected with malware that can spy on your network.
While many enterprises see BYOD programs as a money saver, to be successful, a mobility program, whether BYOD or corporate-owned, needs substantial capital investment, argued tech writer Kapila Gidwani in a CloudTweaks article.
IT departments in regulated industries, such as financial services, struggle with the risks introduced by allowing employees to bring their own devices.
In its latest version, Dropbox has added a new action extension to iOS 8 that enable users to save files directly to the cloud storage service from any iOS app. With this capability already available on Android devices, Dropbox is appealing to more BYOD users with this move.
While BYOD continues to be a security thorn in the side of enterprises, there are steps IT can take to reduce the risks. Here are three strategies that IT can use to secure BYOD devices and apps.
Access to corporate data is a key for workers to get their jobs done. But it also can be the Achilles heel for companies with BYOD programs.
With the influx of personally owned mobile devices into the enterprise, IT departments need to be on guard against jailbroken and rooted devices and malicious apps from foreign countries like China and Russia. Right? Wrong.