BYOD is as entrenched (and complicated) as ever
The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.
The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.
<em>(First in an occasional series about technology and the law.)</em>
“Every single mobile device represents an endpoint where data could be lost, stolen, or compromised."
"The prevalence of poor password policies is mind boggling..."
During a roundtable discussion on the Bring Your Own Device (BYOD) trend, a tech leader candidly offered this bit of real-world insight: "My wife is a nurse. There is no BYOD policy at the hospital. But all of the nurses communicate with each other via SMS, because that's the most efficient way to do their job."
In New York City, venerable companies give luxurious corporate cars to power brokers dressed in Armani suits driving down Wall Street. But across the country in San Francisco, you're more likely to see blue jeans-clad execs driving shared Zipcars to their wacky digs in SoMa, or south of Market.
The Samsung Galaxy S5 is an evolutionary device; the vendor’s new flagship is better than its predecessor across the board, without quite being revolutionary. But while it houses impressive hardware, it is let down by the infamous TouchWiz, Samsung’s own interface overlay which skins Google’s Android 4.4 Kit Kat operating system with heavy-duty software (and in some cases, gimmicks).
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
The mobile world changes fast. Case in point: A year ago thinking that Android devices could be on par with -- and perhaps even overtake -- Apple in the enterprise would have been considered crazy. But the today the race is neck and neck.
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
New technologies and new IT strategies are here to solve all your problems -- except the ones they create
What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
It's a good bet you don't know how much your company is spending on all those bring-your-own-device smartphones and tablets. Even worse, it's probably too much, says a mobility management expert.
As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat.