ChannelLife UK - Industry insider news for technology resellers

Bring Your Own Device (BYOD) stories - Page 8

One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Story image
BYOD security in remote work era still riddled with issues
Fri, 10th Jul 2020
#
dlp
#
data privacy
#
hybrid & remote work
BYOD security remains fraught with risks in the remote work era, as Bitglass' latest report highlights major gaps in corporate data protection efforts.
Story image
All we need to know about reverse proxy
Thu, 4th Jun 2020
#
iaas
#
casb
#
personal computing devices
Understanding reverse proxies is essential for modern organisations seeking robust cloud security. Discover why this architecture stands out.
Story image
Network access control market boosted by remote work trend
Thu, 30th Apr 2020
#
firewalls
#
network security
#
iot
Remote work is driving the network access control market, with the sector expected to grow from USD $1.35 billion in 2019 to USD $2.21 billion by 2024.
Story image
Jamf rolls out telehealth support for healthcare firms
Thu, 30th Apr 2020
#
uc
#
mdm
#
healthtech
Jamf has introduced a new telehealth system to help healthcare workers and those on the front lines interact with patients without putting themselves at risk.
Story image
Jamf rolls out watchOS device control app for parents
Tue, 21st Apr 2020
#
edutech
#
mdm
#
personal computing devices
Jamf rolls out new watchOS app to support remote learning, giving parents and teachers more control over children's devices.
Story image
Jamf announces same-day support for Apple's spring OS release
Mon, 6th Apr 2020
#
mdm
#
personal computing devices
#
apple
Jamf announces same-day support for Apple's spring OS releases, ensuring uninterrupted workflows and new features for devices across the Apple lineup.
Story image
Empowering a remote workforce: can your business make ‘working from home’ work?
Mon, 30th Mar 2020
#
mdm
#
hybrid & remote work
#
cybersecurity
Businesses are adopting remote work strategies to offer flexibility, but without proper planning, it can lead to chaos. Learn how to make it work smoothly.
Story image
Should we really trust those ‘trusted’ devices?
Tue, 10th Mar 2020
#
mdm
#
cybersecurity
#
personal computing devices
A false sense of security surrounds so-called trusted mobile devices and we need to rethink the ‘trusted’ device security model.
Story image
IWD 2020 interview: Jamf’s Melissa Antoine
Sat, 7th Mar 2020
#
mdm
#
software development
#
personal computing devices
Jamf's senior customer success manager Melissa Antoine discusses attracting more women to IT by promoting role models, mentorship, and flexible workplaces.
Story image
New Jamf integration designed to benefit Apple enterprise customers
Tue, 11th Feb 2020
#
mdm
#
it automation
#
personal computing devices
Jamf Pro now allows direct configuration of Jamf Connect, streamlining Mac authentication and identity management.
Story image
Synnex & Jamf ink new Australian partnership
Wed, 22nd Jan 2020
#
mdm
#
healthtech
#
personal computing devices
IT solutions provider Synnex partners with Jamf to give over 6000 channel partners in Australia access to Jamf's Apple device management solutions.
Story image
Key considerations for consistent IoT manageability and security
Mon, 20th Jan 2020
#
iot security
#
mdm
#
personal computing devices
As IoT devices permeate all aspects of life, organisations must prioritise security and manageability to harness their benefits without escalating risks.
Story image
Spark to offer Android's zero-touch enrolment solution
Tue, 17th Dec 2019
#
smartphones
#
mdm
#
supply chain & logistics
Spark becomes one of New Zealand's first carriers to offer Android's zero-touch enrolment, streamlining secure and large-scale deployment for businesses.
Story image
The BYOD juggling act: balancing security, privacy and mobility
Thu, 5th Dec 2019
#
dlp
#
data privacy
#
personal computing devices
The productivity benefits of enabling cloud and mobile mean most organisations offer BYOD. But it's a headache for IT teams. Is there a balance?.
Story image
Jamf announces powerful new product line
Wed, 20th Nov 2019
#
smartphones
#
mdm
#
iam
Jamf has deployed new functionality across its suite of products that take advantage of Apple’s advances for businesses.
Story image
The cost of securing BYOD with mobile agents - Bitglass
Fri, 25th Oct 2019
#
endpoint protection
#
mdm
#
edr
A security solution like mobile device management (MDM) fails to respect user privacy and should not be a common security practice.
Story image
Smartphone market at 'tipping point' while PC landscape is changing
Fri, 27th Sep 2019
#
smartphones
#
digital signage
#
mdm
Device shipments decline by 3.7% in 2019, with smartphones at a 'tipping point' due to longer user retention, while 5G-capable phones are set to rise.
Story image
Jamf extends Apple expertise through security firm buyout
Mon, 19th Aug 2019
#
mdm
#
personal computing devices
#
apple
Jamf has acquired Digita Security to enhance its Apple management suite with robust endpoint protection, addressing rising Mac demand and security needs.
Story image
Gartner highlights importance of master data management
Mon, 29th Jul 2019
#
mdm
#
healthtech
#
personal computing devices
Gartner's 2018 report spotlights the shifting dynamics in master data management, favouring innovative smaller vendors over larger ones.
Story image
CrowdStrike: Best practices for mobile device security
Tue, 28th May 2019
#
endpoint protection
#
ai security
#
edr
As mobile use surges in both personal and corporate spheres, CrowdStrike offers best practices for safeguarding mobile devices against cyber threats.