Access "Taking control of smartphone proliferation while avoiding user anarchy"
This article is part of the May 2012 issue of NAC technology evolves in a BYOD policy world
Many companies will start the year with even more users demanding to attach their new smartphones and tablets to the corporate network. Some companies will welcome this tablet and smartphone proliferation, seeing it as a sign of employees wanting to improve their productivity and work long hours. Others see the trend as an unwelcome addition to network complexity and a potential security risk. According to a survey carried out at the end of 2011by Berkshire-based Star Technology Services of UK, firms with 100 to 1,000 employees found acceptance of user-owned devices is still low. Only one in four workplaces surveyed allowed more than a tenth of workers to use their own devices for work. The BlackBerry was still seen as the safest and easiest to integrate, followed by Apple’s iPhone and iPad devices, while Android trailed behind, with Windows Mobile bringing up the rear. But are companies right to be so cautious about what are undoubtedly becoming the users’ devices of choice over the traditional Windows laptop? Security risks of mobile devices The virus ... Access >>>
Premium Content for Free.
Consumerisation of IT: How to strategise enterprise device management
by Clive Longbottom, Contributor
Amid the rising consumerisation of IT, the traditional “one-size-fits-all” strategy can fail. IT must develop an open approach to consumerisation of devices and use VDI.
- Consumerisation of IT: How to strategise enterprise device management by Clive Longbottom, Contributor
Taking control of smartphone proliferation while avoiding user anarchy
by Ron Condon, UK Bureau Chief
With smartphone proliferation raging through companies, IT teams are turning to MDMs to keep corporate data safe. Are current MDMs up to the task?
European river managers delve into new knowledge management system
by Brian McKenna, News and Site Editor
The UK’s Environment Agency has procured a semantic wiki based knowledge management (KM) system to aid river restoration across Europe.
- Taking control of smartphone proliferation while avoiding user anarchy by Ron Condon, UK Bureau Chief
More Premium Content Accessible For Free
Computer Weekly buyer's guide to endpoint security
In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...
Social Engineering in IT Security
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
Gartner: Digital transformation: How to survive the information crisis
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...