BYOD : Here's Step #1 For Preventing Theft And Avoiding Costly Data Breaches
By Rob Humphrey, Director of Global Business Development, Kensington
Highly respected research firm IDC predicts that global shipments of PCs, tablets, and smartphones will surpass 1.7 billion units by the end of 2014. The United States, UK, and Japan will buy more than 400 million units, representing a retail value of approximately $204 billion
Helping to spur on this explosion in smart mobile device purchases is the ability to leverage them for both personal and business use — making the transition from home to work and back home again, virtually seamless (not to mention, making work from home as efficient, if not more so, than working from the office). Not surprisingly, the growing use of personal mobile devices at work (bring your own device, “BYOD”), especially tablet computers and smartphones, continues to change the face of corporate IT management. For today’s IT department, the days of locking down the corporate network, handing out company-supplied smartphones and limiting/forbidding the use of personal computers and/or tablets are long gone. Instead, IT solutions providers are now building strategies and making investments that enable the secure use of employee-owned devices.
Please log in or register below to read the full article.
Get unlimited access to:
Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.