Saturday, 4 January 2014
The next stage of consumerization: 'The work-life smoothie'
Yet, in the business and IT media, much of the consumerization coverage is about tactical issues: whether to have a bring-your-own-device (BYOD) policy or not; what a BYOD policy should contain; the sort of security software to buy; and how to use BYOD as bait to attract millennials/Gen Y (those born approximately between 1980 and 2000) as employees. These are all valid questions, but they should be asked only after much more strategic business challenges are addressed.
Read the full story
Wednesday, 5 June 2013
Executive Guides
Executive’s Guide to Best Practices in SaaS and the Cloud
Executive’s guide to the evolution of enterprise software
Executive’s guide to software-defined networking
The Executive’s Guide to the Internet of Things
The Executive’s Guide to Windows 8
Friday, 24 May 2013
ZDNet Special Features
The Evolution of Enterprise Software
The 21st Century Data Center
Cloud: How to Do SaaS Right
BYOD and the Consumerization of IT
Tapping M2M: The Internet of Things
Making the Business Case For Big Data
Windows 8 in Business
ZDNet Special features Link
10 worst-case BYOD scenarios (and how to prevent them)
1: Exposed data
2: Passwords in the wild
3: Declining productivity
4: Compatibility issues
5: Bandwidth overuse
6: Device management
7: Wireless bottlenecks
8: Autonomy overuse
9: Virus infections
10: Compatibility complaints
Bring Your Own Drama
It’s coming to an IT department near you. When it does, be prepared for anything and everything. You’re dealing with the teen years of mobile devices and you’re going to have to have tricks up your sleeve you never thought you’d need. But if you’re prepared, and if you’ve prepared your users, that drama will hardly get the chance to rear its ugly head.
Read the full post
Related Articles
10-essential-elements-of-byod-training
10 BYOD mobile device management suites you need to know
Friday, 1 March 2013
10 considerations for BYOD cost/benefit analysis
1: Current costs of company-owned devices
2: Cost of implementing and managing an MDM solution
3: Costs of BYOD policy development and program management
4: Updating in-place enterprise security and help desk
5: Hidden back-end costs
6: Benefits to employee morale and productivity
7: Costs of BYOD stipends and/or allowances
8: Risk management expenses
9: Internal app development costs
10: Benefits of employees being more responsive to your customers
Wednesday, 30 January 2013
Ten Tips for Establishing a Secure Foundation for BYOD
Often times, BYOD is referred to as the “consumerization of IT,” which also captures a key concept and concern for IT administrators. This being that these new devices entering the corporate environment are often consumer-grade devices, rather than managed, controlled and secured corporate IT assets.
This white paper describes the market drivers behind the BYOD phenomenon, the challenges presented to an organization, a strategic outline to manage BYOD, and how WatchGuard helps to create a secure BYOD ecosystem.
Thursday, 27 December 2012
Best Practices for Supporting 'Bring Your Own' Mobile Devices
Saturday, 13 October 2012
Mobility disruption: A CIO perspective
Wednesday, 20 June 2012
BYOD and Mobile Strategy
iPhones, iPads, Androids, Windows Phones, and more are joining your business's suite of technology tools, driven by user demand and need. Most companies have opened up their networks to such devices, but big questions remain on how to do so securely, how to manage the new breed of devices to ensure compliance and information security while not unduly burdening users. This guide looks at all aspects of the issue, including the underlying consumerization trend,the role of policy-based management, device capabilities, and strategies for mobile device management (MDM) and mobile application management (MAM).