FutureFive Australia - Consumer technology news from the future

Bring Your Own Device (BYOD) stories - Page 11

One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Thinkstockphotos 881484382

How offering IT 'self-service' can help create a more attractive workplace

Fri, 22nd Jun 2018
#
mdm
#
byod
#
notebook
How technology is offered in the workplace can have an instrumental impact on how an organisation is perceived and whether people will want to stay.
Thinkstockphotos 917797962

Unisys extends cyber protection to IoT and connected devices

Wed, 18th Apr 2018
#
mdm
#
iot
#
healthtech
Unisys has moved to include Internet of Things (IoT) devices and other internet connected equipment in the new version of its Unisys Stealth.
Screen shot 2018 03 27 at 1

57% of enterprises suspect their mobile workers have been hacked

Wed, 28th Mar 2018
#
vpns
#
cybersecurity
#
byod
iPass has released the results of a survey that sought to determine how companies are dealing with the trade-off between security and mobile workers.
Fallback

Is there an answer for soaring numbers of cyberbullying cases?

Fri, 16th Mar 2018
#
mdm
#
iot
#
smart home
In the wake of the mass digitisation taking homes by storm, cyberbullying and online harassment has accelerated 60 percent with no signs of slowing.
Thinkstockphotos 152946044

Why a secure perimeter is no longer enough protection for your IT infrastructure

Mon, 12th Mar 2018
#
mfa
#
mdm
#
iam
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Thinkstockphotos 477245744

25% of firms fail to implement multi-factor authentication for BYOD

Fri, 16th Feb 2018
#
data protection
#
surveillance
#
biometrics
25% of respondents at the Gartner Symposium lacked some form of multi-factor authentication when securing BYOD.
Fallback

Struggling with IoT or BYOD? Here's how to overcome the main challenges

Fri, 19th Jan 2018
#
firewalls
#
network security
#
iot
​The ideas of 'bring your own device' (BYOD) and Internet of Things (IoT) are a dream come true for most employees – but a nightmare for IT staff.
Pexels photo 207489

Cloud Access Security Broker: A force to be reckoned with in the new-age of cloud computing

Wed, 13th Dec 2017
#
cloud security
#
casb
#
byod
Before midday I had already accessed and shared information through three cloud based applications for work, and I had checked in to others.
Thinkstockphotos 805657820

Android's poor system update process is putting devices at risk

Tue, 12th Dec 2017
#
mdm
#
google
#
byod
Singh says that even one year after Android 7.0 Nougat was released, only 17% of devices run the operating system. The statistics are poorer for 7.1.
505

Connecting the dots between BYOD and the cloud

Mon, 11th Dec 2017
#
hyperscale
#
public cloud
#
microsoft
When it comes to the cloud, companies and organisations have become more comfortable with running critical business workloads there.
Iot6

AWS launches new IoT services for scale; brings Machine learning to the Edge

Thu, 30th Nov 2017
#
hyperscale
#
public cloud
#
mdm
Amazon Web Services (AWS) has announced six new services for IoT devices, including AWS IoT 1-Click and AWS Greengrass ML Inference.
Thinkstockphotos 859640008

Two thirds of ANZ businesses concerned about IoT and OT security

Wed, 22nd Nov 2017
#
iot security
#
mdm
#
iot
Enterprises across the globe are worried about the impact of Internet of Things (IoT) technology and operational technology (OT).
Fallback

Never worry about device security policies again with an NAC

Mon, 20th Nov 2017
#
firewalls
#
network security
#
iot
IDC interviewed five organisations that use Aruba ClearPass as a policy management platform for network access control.
Hand data

1 in 4 organisations relying solely on passwords to secure BYOD

Tue, 7th Nov 2017
#
malware
#
mfa
#
casb
​Bitglass has released the findings from its newest research, 'BYOD and Identity', which are alarming to say the least.
Device learning

Why schools need to ramp up their cybersecurity measures

Tue, 24th Oct 2017
#
edutech
#
cybersecurity
#
healthtech
They house the sensitive information that hackers specifically seek, are running a wide variety of unprotected endpoints, and have limited resources.
Screen shot 2017 10 16 at 2

The internet of security things: Protecting data with a mobile workforce

Mon, 16th Oct 2017
#
daas
#
mdm
#
iot
IGEL's Jeff Kalberg outlines 5 technical developments aimed at improving mobile data security and endpoint experiences resellers and MSPs can harness.
Thinkstockphotos 615104368

SOTI reports increased global revenue and partner growth

Mon, 2nd Oct 2017
#
mdm
#
iot
#
partner programmes
The launch of the SOTI ONE platform in May saw the company grow the number of customer trials by 57% from the previous year.
Software enterprise

3 new small cell solutions launched by Ericsson to expand market

Wed, 6th Sep 2017
#
uc
#
iot
#
5g & beyond
The new models have been designed to help expand the market & meet the growing demand for better mobile coverage and capacity in light of 5G and IoT.
Thinkstockphotos 676364296 gtipnbb

IoT and BYOD still putting firms in the face of danger

Thu, 24th Aug 2017
#
iot
#
byod
#
empired
As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks.
Thinkstockphotos 639637280

VMware and Google provide Chrome management capabilities

Wed, 23rd Aug 2017
#
virtualisation
#
mdm
#
it automation
VMware teams up with Google, bringing Chrome OS into its endpoint management fold, promising simplified IT oversight and robust security.