Premium Content

Access "BYOD security issues do exist, but IT teams shouldn’t fear the trend"

Published: 15 Nov 2012

A lot of people are talking about BYOD, or the “bring your own device” trend. We know users want BYOD, and we know that we’re nervous about it. The reality is that BYOD is here whether you acknowledge it or not. Your lack of support doesn’t keep iPads and home computers out of your office. So it’s time to embrace it. The Trust Hang-up Companies have many valid concerns, including questions like, “How will I support users on XYZ device?” or “What about my liability?” or “How will I secure these things?” But, fortunately, the fears of BYOD are more perceived than real; BYOD isn’t fundamentally different from what you already do today. End-user support is already tricky (and in place). BYOD doesn’t change that. And security concerns about users’ devices? Come on! We all know that “physical access” is the Achilles’ heel of any security system, and your users already have physical access to the devices they take home. Enterprise IT pros talk of two issues around security and BYOD: They wonder if they can trust corporate data and apps on personal devices, and they... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Cloud migration confidential

    Any cloud migration strategy will likely start with a good dose of preparation, say experts in the cover story for the September issue of Modern ...

  • DevOps tools for workload management

    Workload automation and streamlined management are essential to support fast-changing business applications and a hybrid or private cloud computing ...

  • The processor problem: One size doesn't fit

    Conventional x86 processors try to do everything, but they are power hungry and performance inefficient. Stripping down processors to get the ...