The Ultimate Guide to Bring Your Own Device
2024 edition
Overview
Also known as BYOD.
One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Analyst reports
Enterprise Management Associates on BYOD & BI
Fleet revises open-source platform for unified device m...
Mon, 29th Jan 2024
Forrester Research on BYOD & DDoS
ArtificiaI Intelligence and Cybersecurity: The Bad and ...
Fri, 1st Dec 2023
Juniper Research on BYOD & Mobility
Carrier billing spend to reach $122 billion globally by...
Wed, 26th Apr 2023
Expert columns
By Frank Baldrighi of GETAC
Four enterprise mobility trends shaping 2024
Last month
By Contributor of SOTI
What’s behind the tech revolution transforming Australi...
Last month
By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Wed, 29th Nov 2023
By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Mon, 6th Nov 2023
By Kern Smith of Zimperium
BYOD and mobile devices heighten healthcare cyber risks
Fri, 15th Sep 2023
More expert columns
By J.T. Keating of Zimperium
Statistics shock as threats to mobile devices escalate
Wed, 6th Sep 2023
By Chris Barton of Absolute Software
Security and compliance challenges remain across distri...
Tue, 29th Aug 2023
By Sojung Lee of TeamViewer
Securing remote management tools boosts business protec...
Fri, 28th Jul 2023
By Akhil Bhutani of APJ Business
Why mobile security protection is a public necessity
Fri, 30th Jun 2023
By Ian Farquhar of Gigamon
Zero Trust and deep observability: the cybersecurity pa...
Fri, 23rd Jun 2023
By SOTI
SOTI Solves Troubleshooting and Security Issues for Tre...
Mon, 5th Jun 2023
Top players
Recent news
About Remote Working
Advanced Malware Detection market could reach $43bn by ...
This month
About Mobility
Beyond Identity unveils Device360 for advanced device s...
Last month
About Malware
Jamf report highlights poor cyber hygiene in organisati...
Last month
About Malware
Darktrace says Cyber threats shifting towards as-a-serv...
Last month
About Malware
Enzoic predicts cybersecurity trends & threats for 2024
Wed, 29th Nov 2023
More news
About iOS
TeamViewer unveils major update for Tensor with enhance...
Wed, 1st Nov 2023
About Contact Centre
Kingsfield Tech team granted Microsoft Gold Accreditati...
Wed, 4th Oct 2023
About Cloud Services
BeyondTrust and Jamf to enhance Mac endpoint security
Mon, 25th Sep 2023
About Resellers
Ingram Micro New Zealand signs distribution deal with J...
Thu, 6th Jul 2023
About EduTech
Jamf empowers more than 42 million students globally
Fri, 30th Jun 2023
Even more news
About Connectivity
TeamViewer unveils new remote access and support soluti...
Fri, 28th Apr 2023
About Endpoint Protection
Jamf launches detection and response tool for mobile de...
Wed, 26th Apr 2023
About Mobility
Jamf joins Microsoft Intelligent Security Association
Thu, 20th Apr 2023
About iOS
Jigsaw24 partners Kandji for device management solution...
Thu, 6th Apr 2023
About Public Sector
Hundreds of devices declared missing by government depa...
Mon, 20th Mar 2023
Other guides
You can read other related guides from Mobility, Cybersecurity, Cloud Services, Breach Prevention, and Data Loss Prevention.
Powered by