By Nathan Pearce, F5’s Senior Technical Marketing Manager
This week at Infosec has been a great opportunity to talk to fellow security experts and businesses alike and it’s no surprise that BYOD has remained top of the agenda.
In fact, our survey of 120 attendees during the first day of the event revealed that BYOD tops the challenges that IT leaders are facing when trying to secure their networks and devices. 87 per cent highlighted that it is more difficult than ever to secure their business from the threat of cyber attacks, with almost one in four citing the BYOD trend as the major factor in why their organisation is more vulnerable.
If one thing is certain around BYOD, it is that there are still many questions to be answered as organisations charge forward in the face of significant complexity and confusion. However, according to Exinda, there are important tactics network managers can employ to take advantage of BYOD.
By Ian Callens from IT service, support and solutions provider Icomm Technologies
It’s great that so many businesses are embracing new technology and looking for new ways to engage their workforce. Indeed industry research shows 81% of companies now accommodate personal devices in the office, whilst 54% have formalised ‘bring you own device’ (BYOD) policies.
BYOD is clearly here to stay and this is being driven by perceived business rewards of a more flexible, mobile and agile workforce driven by the workforce. However, BYOD is a subject trying to force a wedge between finance and IT, where finance sees cost benefits and IT views the enormous security, support and implementation issues. Continue reading
By Rob Newburn, Head of Information Security & Managed Services, Trustmarque
As an increasing number of employees are bringing mobile devices into the workplace, many organisations are keen to take advantage of this trend and encourage their use for business purposes.
The benefits of Bring Your Own Device (BYOD) are well-known and have been widely written about, but less well discussed are the thought processes and diligence that need to be undertaken to make this secure as well as successful. By formally adopting BYOD, organisations can lose some control over IT hardware and how it is used. However, with an effective plan of action it is possible to balance user productivity with security.
The key to the success of a BYOD programme is the preservation of user experience. If the user experience is compromised, employees will very quickly switch off. Here are some of the main things you need to consider in order to preserve user experience and maintain corporate security. Continue reading
By Roee Adler, Chief Product Officer, Soluto
If you’re an IT professional in a small business, or even a corporation, you’re definitely seeing more and more employees using their own smartphones, tablets or laptops for work. According to recent studies, more than 80% of employees use at least one personal device for business use.
Although the issue of workers bringing their own devices isn’t new, it’s actually part of two bigger changes that started taking place in the technology within the past few years. One of these changes is the arrival and adoption of cloud computing and the transition of more and more company infrastructures and services to the cloud. The second change is mobility and the complete evolution of mobile devices. Tablets and smartphones have caused huge changes in the way people work with computers. Continue reading
By Charles Stones, Professional Services Consultant at Altodigital
Over the last 12 months we have seen increasing demand for mobile print solutions from companies of all sizes, as BYOD becomes more common in the workplace and employees become increasingly mobile. Much of this demand is originating from employees themselves; they can work where they want, so why not print?
IT departments are quite rightly looking to organisations like ourselves to put in place secure and powerful mobile print systems to effectively manage this process, but it’s important for businesses fully understand the opportunities as well as the risks when it comes to BYOD and mobile print. Continue reading
By Joakim Sundberg, F5 Security Solution Architect
While it seems like the industry has been talking about it for years, a recent report by Forrester warned that BYOD uptake has only just begun.
It’s true the concept started to be discussed by corporates back in 2007 when business executives began demanding access to corporate resources on their shiny new iPhones. But Forrester’s right in that it’s only now that large numbers of organisations are starting to implement BYOD initiatives. And this increase is largely driven by the rise of cloud apps we can access on our mobile devices, and the influence they’re having on the way we work. Continue reading
By Dean Guida, President and Chief Executive Officer, Infragistics
There is much talk about the Bring Your Own Device (BYOD) movement, but what does it really take to embrace the mobile revolution? Businesses need to weigh up the benefits of increased productivity and job satisfaction versus the resources required to manage a mountain of tablets, not to mention the security risk of employees accessing sensitive corporate information on their own devices.
Tablets are quite rightly considered to be extremely convenient for the user and they do foster a ‘work anywhere’ ecosystem. The flexibility and portability of a tablet empowers employees to take their work on-the-go and fit it into a changing workweek, where clocking 9-to-5 hours is less important than productivity. Continue reading
By Justin Woolen, product sales specialist at Cisco. and guest speaker at the e-Crime Wales Summit in Llandudno
For some time now IT managers and IT decision-makers have come under increasing pressure to enable the use of personal devices in the work environment. In just a short period of time ‘bring your own device’ has become common business parlance. But for businesses, simply allowing access of personal devices isn’t the answer.
To ensure success it’s a question of enabling relevant, secure access across the entire network, while protecting corporate assets and delivering an optimal user experience. However, there are quantifiable benefits associated with allowing employees to use their own mobile devices on their employers’ networks. This article will explore the challenges faced when enabling BYOD and explain how to overcome these challenges and enable BYOD effectively. Continue reading
By David Sturges, Chief Operating Officer, WorkPlaceLive
The news that the chief executive of Yahoo! Marissa Mayer has banned executives from working from home is bound to go down like a lead balloon. She has been accused of taking the company back to the 1980s. Richard Branson has been drawn into the debate who commented that Ms Mayer’s pronouncement was ‘perplexing’ and ‘backwards ’in today’s mobile work environment. Continue reading