Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Managing Mobility
Showing posts tagged with mobile workforce
Showing posts in English
CherylTang | 15 Sep 2014 | 0 comments

devices.jpgLike it or not, companies are continuing to face a wave of new internet-connected devices hitting their networks. Driven by employee’s desire for newer, sleeker, and faster devices, IT departments are often finding themselves hurrying to develop a Bring-Your-Own-Device (BYOD) programs and mobility policies that’s both secure and appealing to their end users. There’s little doubt that BYOD programs are growing in popularity, Gartner predicts that as many as half of employers will soon require employees use their own device for work purposes. However, the governing policies for these programs are sometimes implemented clumsily, or not at all. Getting these policies right the first time can be extremely important to not only the security of business data and intellectual...

Solange Deschatres | 23 Jun 2014 | 0 comments

BYOD vs CYOD.jpegThe last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature.

But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every evening, and what happens to it off-site often has IT staff pulling their hair out. According to Osterman Research, 15% of employees...