Executive Briefings

Can a Company Be Secure When So Many Folks Use So Many Different Personal Devices for Work?

The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point?

Companies looking to embrace BYOD - 44 percent of firms surveyed by Citrix say they have a BYOD policy in place and 94 percent plan to implement BYOD by 2013 - need to address four key areas: 1) standardization of service, not device, 2) common delivery methods, 3) intelligent access controls, and 4) data containment.

Read Full Article

The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point?

Companies looking to embrace BYOD - 44 percent of firms surveyed by Citrix say they have a BYOD policy in place and 94 percent plan to implement BYOD by 2013 - need to address four key areas: 1) standardization of service, not device, 2) common delivery methods, 3) intelligent access controls, and 4) data containment.

Read Full Article