Bring your own Device or Build your own Demise: Promises and Pitfalls of BYOD

I was recently asked a number of questions concerning bring-your-own-device (BYOD) security implications. Here are my responses… 1. According to research the majority of organisations now… [Read More…] View full post on IT-Director.com For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber…

read more

Cloud, BYOD Increases Need for Automated IAM Systems

As traditional security concepts of perimeter and end-point defense break down as a result of the proliferation of cloud services and the BYOD phenomenon, enterprises are increasingly feeling the need for greater control over access to applications. That's where automated identity and access management comes in. View full post on…

read more

Avaya joins crowded BYOD, MDM field

At Interop this week, Avaya will toss its hat into the rapidly expanding BYOD ring with new software for its policy manager that helps IT get a handle on mobile device management. View full post on Computerworld Security News View full post on National Cyber Security » Announcements

read more