Bring Your Own Device (BYOD) stories - Page 9
One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.

Key considerations for consistent IoT manageability and security
Mon, 20th Jan 2020
#
iot security
#
mdm
#
personal computing devices
As IoT devices permeate all aspects of life, organisations must prioritise security and manageability to harness their benefits without escalating risks.

Spark to offer Android's zero-touch enrolment solution
Tue, 17th Dec 2019
#
smartphones
#
mdm
#
supply chain & logistics
Spark becomes one of New Zealand's first carriers to offer Android's zero-touch enrolment, streamlining secure and large-scale deployment for businesses.

The BYOD juggling act: balancing security, privacy and mobility
Thu, 5th Dec 2019
#
dlp
#
data privacy
#
personal computing devices
The productivity benefits of enabling cloud and mobile mean most organisations offer BYOD. But it's a headache for IT teams. Is there a balance?.

Jamf announces powerful new product line
Wed, 20th Nov 2019
#
smartphones
#
mdm
#
iam
Jamf has deployed new functionality across its suite of products that take advantage of Apple’s advances for businesses.

The cost of securing BYOD with mobile agents - Bitglass
Fri, 25th Oct 2019
#
endpoint protection
#
mdm
#
edr
A security solution like mobile device management (MDM) fails to respect user privacy and should not be a common security practice.

Smartphone market at 'tipping point' while PC landscape is changing
Fri, 27th Sep 2019
#
smartphones
#
digital signage
#
mdm
Device shipments decline by 3.7% in 2019, with smartphones at a 'tipping point' due to longer user retention, while 5G-capable phones are set to rise.

Jamf extends Apple expertise through security firm buyout
Mon, 19th Aug 2019
#
mdm
#
personal computing devices
#
apple
Jamf has acquired Digita Security to enhance its Apple management suite with robust endpoint protection, addressing rising Mac demand and security needs.

Gartner highlights importance of master data management
Mon, 29th Jul 2019
#
mdm
#
healthtech
#
personal computing devices
Gartner's 2018 report spotlights the shifting dynamics in master data management, favouring innovative smaller vendors over larger ones.

CrowdStrike: Best practices for mobile device security
Tue, 28th May 2019
#
endpoint protection
#
ai security
#
edr
As mobile use surges in both personal and corporate spheres, CrowdStrike offers best practices for safeguarding mobile devices against cyber threats.

Businesses failing to secure BYOD - Bitglass
Fri, 3rd May 2019
#
dlp
#
ueba
#
cybersecurity
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.

Sophos offering mobile device management with Microsoft Intune integration
Tue, 2nd Apr 2019
#
firewalls
#
network infrastructure
#
endpoint protection
Running on Microsoft Azure, the Sophos integration will enable IT administrators to configure individual device usage policies within Microsoft Intune.

BYOD can be secure with the right measures
Mon, 25th Mar 2019
#
endpoint protection
#
mfa
#
dlp
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.

Achieving uncompromising security without compromising privacy
Fri, 1st Feb 2019
#
endpoint protection
#
casb
#
edr
Navigating the BYOD era, companies must balance robust security measures with user privacy, steering away from invasive MDM to agentless solutions.

How to combat human error in cyber risks
Thu, 29th Nov 2018
#
endpoint protection
#
biometrics
#
edr
Over a third of Aussie firms suffer data breaches due to staff errors, underlining dire need for cybersecurity training.

Why endpoint security is critical in a post-perimeter era
Thu, 22nd Nov 2018
#
malware
#
endpoint protection
#
casb
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.

Three ways to achieve data security whilst enabling BYOD
Mon, 19th Nov 2018
#
dlp
#
personal computing devices
#
byod
Balancing data security with a BYOD policy is challenging. Here are three strategies, from MDM to agentless mobile security, to achieve it.

UEM solutions may be the key to mobile security
Mon, 10th Sep 2018
#
mdm
#
wireless networks
#
personal computing devices
Microsoft’s rise in Gartner’s UEM rankings highlights their innovative multi-layered mobile security approach, surpassing traditional MDM solutions.

Is BYOD an expensive mistake for your business?
Wed, 22nd Aug 2018
#
personal computing devices
#
byod
#
mobility
Although BYOD can seem like a cost-effective mobility solution, experts warn it might backfire due to security, productivity, and cost concerns.

Apple ecosystem management systems on the rise in ANZ
Tue, 7th Aug 2018
#
mdm
#
personal computing devices
#
apple
Jamf opens a Sydney office to support its expanding Apple ecosystem management service in ANZ, aiming to enhance customer experience and training capabilities.

Venafi announces new enterprise endpoint management solution
Wed, 4th Jul 2018
#
endpoint protection
#
encryption
#
edr
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.