Detecting the rogues While the BYOD DMZ incentive solution works for those that have not accessed the network before, there may be users that have already illicitly accessed the network. If they refuse or are otherwise unlikely to change their system setting to use the new “official” method, you’ll have to find these rogue devices…
Tag: BYOD security
Best Practices for BYOD on a Budget
by Jim MacLeod, Product Manager at WildPackets While the bring-your-own-device (BYOD) to work is a growing trend within the IT world, the main issue is that consumer-friendly technology is changing the way people want to work. Smartphones have provided mobile email for a decade, but the market has moved from business phones complete with corporate…
Enhancing Workforce Mobility with Consumerization
by Jamie Ryan, senior vice president, Information Technology and Chief Information Officer for Aspect Within the last few years, businesses have undergone a major transformation as the consumerization of IT makes its way into the enterprise and bring-your-own-device (BYOD) policies become more prevalent. Workers want the same technologies on the job As today’s workers are…