BYO policies News
April 04, 2014
Enterprise IT teams must address security pitfalls, assign BYOD policies for personal devices in the workplace, says vendor panel at Interop 2014.
October 22, 2013
A Fortinet survey shows that a majority of young users will violate IT security policies governing BYOD and cloud services to boost productivity.
September 12, 2013
A mobile workforce that uses the cloud needs their company to think about end-user segmentation to determine the best devices for their needs.
May 30, 2013
As BYOD continues to proliferate in the workplace, mobile device security remains a top IT priority, according to a recent SearchCompliance survey.
BYO policies Get Started
Bring yourself up to speed with our introductory content
Although the management of BYOD programs has primarily fallen on IT, experts say HR must now get involved to create BYOD policies for employees. Continue Reading
Establishing policies for BYOD remains a top priority for CIOs, according to SearchCIO readers in our latest CIO Chatter. Continue Reading
A BYOD policy, or bring-your-own-device policy, is a set of rules governing a corporate IT department’s level of support for employee-owned PCs, smartphones and tablets. Continue Reading
Evaluate BYO policies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Before implementing containerization or other technologies, CISOs need to craft an enterprise strategy to secure employee-owned devices. Continue Reading
In this recap, #CIOChat-ters discuss who should be concerned about the wearable device, and when CIOs might need to prepare related wearable policies. Continue Reading
Software security ranks high among security executives' concerns but low in terms of time spent, according to an (ISC)2 CXO study. Continue Reading
Manage BYO policies
Learn to apply best practices and optimize your operations.
Avoiding command-and-controls policies can help IT better respond to the growing needs of mobile workers and meet its organization's goals. Continue Reading
'Bring your own cloud' practices are on the climb. Tom Nolle explains how companies can apply governance practices to protect themselves. Continue Reading
A BYOD security policy is one cornerstone of a successful BYOD program. Learn why flexibility is also crucial to BYOD success, in this webcast series. Continue Reading
Problem Solve BYO policies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Software project manager Kay Diller gives five tips on keeping boundaries between work and personal life by embracing BYOD and security. Continue Reading
The adoption of consumer tech in business is trending toward wearable devices. In this tweet recap, learn how to prep for wearables in the workplace. Continue Reading
Contributor Chris Moyer describes how to modify BYOD rules and policies to protect data from leaving the company on ex-employees' devices. Continue Reading