Menu
BYOD: Big security, small devices

BYOD: Big security, small devices

Securing consumer devices so they can be used in the enterprise isn't easy, but vendors are rising to the challenge.

The analysts have a term for it: BYOD, or "bring your own device." IT managers have their own term for it: Trouble.

Once, mobile devices were exclusively issued -- and managed -- by a company's IT department. With the broadening of the mobile device market -- and with stylish, powerful smartphones and tablets becoming commodity products -- can you blame anyone for wanting to use theirs for work?

The whole question of how to secure those devices in the first place is a spur for both innovation and controversy. The good news: The most recent wave of mobile devices for the consumer reveals that device makers are conscious of this issue, and turning more attention towards adding enterprise security features. The bad news: There are still plenty of devices in circulation without such security.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about etwork

Show Comments
[]