Guest Column | October 31, 2014

BYOD : Here's Step #1 For Preventing Theft And Avoiding Costly Data Breaches

By Rob Humphrey, Director of Global Business Development, Kensington

Highly respected research firm IDC predicts that global shipments of PCs, tablets, and smartphones will surpass 1.7 billion units by the end of 2014. The United States, UK, and Japan will buy more than 400 million units, representing a retail value of approximately $204 billion  

Helping to spur on this explosion in smart mobile device purchases is the ability to leverage them for both personal and business use — making the transition from home to work and back home again, virtually seamless (not to mention, making work from home as efficient, if not more so, than working from the office).  Not surprisingly, the growing use of personal mobile devices at work (bring your own device, “BYOD”), especially tablet computers and smartphones, continues to change the face of corporate IT management.  For today’s IT department, the days of locking down the corporate network, handing out company-supplied smartphones and limiting/forbidding the use of personal computers and/or tablets are long gone.  Instead, IT solutions providers are now building strategies and making investments that enable the secure use of employee-owned devices. 

Please log in or register below to read the full article.

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights