CFOtech Asia - Technology news for CFOs & financial decision-makers

Bring Your Own Device (BYOD) stories - Page 13

One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Story image
Mobile Mentor adds mobility to TaaS supplier panel
Tue, 17th Nov 2015
#
mdm
#
personal computing devices
#
mobility
Mobile Mentor will provide managed security and managed mobility services to the NZ government, after being named part of the TaaS supplier panel.
Story image
Calling all South Island iPad fleet organisations
Fri, 13th Nov 2015
#
mdm
#
software development
#
personal computing devices
If managing all your mobile devices is becoming a hassle, Christchurch-based Rev IT may have the solution for you.
Story image
BYOD and you: How to successfully bring tech into the classroom
Thu, 12th Nov 2015
#
edutech
#
personal computing devices
#
byod
The BYOD trend has the ability to bring many benefits to schools but it also has the potential to cause significant disruption.
Story image
Device use taking toll on Kiwi kids' - and adults' - eyes
Thu, 29th Oct 2015
#
personal computing devices
#
byod
#
tablets in schools
Kiwi kids – and adults – are suffering from eye damage from excessive use of devices according to a Kiwi optometrist who is urging more care.
Story image
Five steps to maximise BYOD benefits without compromising data
Tue, 13th Oct 2015
#
mdm
#
cybersecurity
#
personal computing devices
Unlock the potential of BYOD with Acronis' five steps, ensuring flexibility without forsaking corporate data security.
Story image
CIOs and mobility: Stop reacting, start doing
Wed, 7th Oct 2015
#
mdm
#
personal computing devices
#
dimension data
Organisations unsure how to approach end user computing and manage device security, says 2015 Mobile Workforce Report.
Story image
BYOD and UC&C adoption shows no sign of slowing down
Fri, 25th Sep 2015
#
personal computing devices
#
uc
#
collaboration
In recent years, BYOD has blossomed in the consumer space and proceeded to move steadfastly into professional settings, disrupting the traditional wor.
Story image
Encryption: The answer to the enterprise mobility problem
Wed, 23rd Sep 2015
#
dr
#
data protection
#
encryption
Mobility brings opportunities to businesses, enabling employees to work and collaborate from anywhere in the world, but it also brings up new threats.
Story image
BYOD demands putting more pressure on wireless infrastructure
Mon, 21st Sep 2015
#
wireless networks
#
personal computing devices
#
wifi
Surge in BYOD usage challenges corporate Wi-Fi networks to provide seamless, high-speed connectivity amidst growing device demand.
Story image
Enterprise mobility management market set to quadruple
Mon, 7th Sep 2015
#
personal computing devices
#
byod
#
ovum
Enterprise mobility management software market is expected to quadruple over the next 4 years, with opportunities for fastest growth coming from APAC.
Story image
Schools need to be ready for the tsunami of 'digital change'
Wed, 12th Aug 2015
#
edutech
#
digital transformation
#
e-learning
Pakuranga College in Auckland will be exploring the key issues facing schools when implementing eLearning/BYOD programmes with an ELearning summit.
Story image
Blue Coat forms endpoint security alliance
Tue, 4th Aug 2015
#
firewalls
#
network security
#
dei
Blue Coat unveils an endpoint alliance ecosystem, allowing intelligence from partner endpoint solutions to be shared with the entire Blue Coat range.
Story image
BYOD data usage costing enterprises
Tue, 4th Aug 2015
#
personal computing devices
#
byod
#
good technology
BYOD policies are straining company resources with uncontrolled data usage. Good Technology's new solutions aim to cut costs and simplify mobile rollouts.
Story image
Ricoh: organisations must adapt to suit mobile workforce
Mon, 27th Jul 2015
#
iot
#
personal computing devices
#
ricoh
The workplace is changing and employers need to adapt to stay connected. @RicohAustralia gives three steps to be ready for the workplace of the future.
Story image
BYOD market to reach $266 billion by 2019
Fri, 17th Jul 2015
#
personal computing devices
#
byod
#
mobility
The Bring Your Own Device and enterprise mobility market is forecasted to grow from $71.93 billion in 2013 to $266.17 billion in 2019.
Story image
Wi-Fi networks more important now than ever before
Thu, 16th Jul 2015
#
iot
#
wireless networks
#
personal computing devices
Increased adoption of the Internet of Things and Bring Your Own Device is resulting in growing demands for Wi-Fi networks.
Story image
Partners to profit from Citrix focus on end to end services
Fri, 10th Jul 2015
#
virtualisation
#
daas
#
mdm
With Citrix's shift to full-service solutions, partners prep for profit boosts and end-to-end sales excellence in ANZ markets.
Story image
Why digital technologies are used for learning
Thu, 9th Jul 2015
#
edutech
#
personal computing devices
#
ministry of education
Digital technologies offer new opportunities for teachers and education leaders, and new ways for parents and communities to contribute to learning.
Story image
Many businesses still lagging behind in BYOD adoption
Wed, 1st Jul 2015
#
personal computing devices
#
byod
#
mobility
Nearly a third of companies still do not actively support a BYOD programme, despite the fact that mobility and remote working are growing trends.
Story image
Technology: Just one part of the security problem
Tue, 30th Jun 2015
#
breach prevention
#
cybersecurity
#
personal computing devices
Companies face security risks beyond just technology, says industry association CompTIA. Lack of security policies and human error are key vulnerabilities.