TechDay Canada - Canada's technology news network
Canada
Search

Bring Your Own Device (BYOD) stories - Page 5

One of the more obvious acronyms you’ll encounter in the information technology, BYOD is exactly what it appears to be: your own devices used at home, but brought into the office and used for work. BYOD is a big deal in the technology space because it requires careful management, with issues including keeping personal information and apps separate from professional ones, securing company data, and establishing how support is provided. With the proliferation of smartphones, tablets and personally-owned laptops and other devices, BYOD is a practical reality for almost every organisation today.
Story image
Your tools, your choice: why allow employees to choose their own devices?
Wed, 6th Jul 2022
#
mdm
#
hybrid & remote work
#
healthtech
Skills shortage in Australia prompts businesses to offer attractive incentives, including flexible working and technology choices, to retain top talent.
Story image
Jamf introduces new content filtering solution for education providers
Wed, 6th Jul 2022
#
mdm
#
data privacy
#
personal computing devices
Jamf launches Jamf Safe Internet, an Apple-first, education-focused cybersecurity solution, offering comprehensive content filtering for students.
Story image
Forescout reveals top vulnerabilities impacting OT vendors
Wed, 29th Jun 2022
#
iot security
#
mdm
#
personal computing devices
Forescout’s Vedere Labs has disclosed OT: ICEFALL, naming 56 vulnerabilities affecting devices from 10 operational technology vendors.
Story image
Jamf updates healthcare IT to protect data on Apple devices
Fri, 17th Jun 2022
#
mdm
#
rpa
#
healthtech
Jamf has rolled out new functionality to help healthcare and IT teams protect patient data and streamline clinical access for their Apple fleet.
Story image
How rugged devices can support organisations when the cloud goes out
Tue, 7th Jun 2022
#
dr
#
mdm
#
risk & compliance
Businesses are facing an increased risk from extreme weather events, making rugged devices vital in the case of a disaster.
Story image
How zero trust can lead the battle against ransomware
Thu, 26th May 2022
#
malware
#
ransomware
#
breach prevention
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Jamf unveils new technologies for business security
Wed, 4th May 2022
#
malware
#
firewalls
#
network infrastructure
Jamf has showcased new technologies it has developed to assist organisations in offering an enterprise secure and straightforward environment for consumers.
Story image
CSG delivers mobile management across 6,000 users with Microsoft Intune
Tue, 12th Apr 2022
#
smartphones
#
mdm
#
iam
Cloud Solutions Group has announced the delivery of an integrated mobile device and access management solution for John Holland Group.
Story image
Jamf releases a new plan for small and midsized businesses
Wed, 23rd Mar 2022
#
mdm
#
cybersecurity
#
personal computing devices
Apple enterprise management company Jamf has introduced Jamf Fundamentals, a new plan built to fit small and midsized businesses' unique needs.
Story image
IWD 2022: Jamf on what you can do to break the bias
Tue, 8th Mar 2022
#
mdm
#
dei
#
personal computing devices
Both last year’s #choosetochallenge and this year’s #BreakTheBias themes for International Women’s Day should serve as a wake-up call to the IT industry.
Story image
Jamf announces integration with Google Cloud’s ZTA solution
Tue, 22nd Feb 2022
#
malware
#
hyperscale
#
public cloud
Jamf has announced a new integration with BeyondCorp Enterprise, bringing macOS compliance to Apple administrators using Jamf and Google Cloud.
Story image
Consumerisation tips corporate Australia to click subscribe
Tue, 22nd Feb 2022
#
converged infrastructure
#
hybrid & remote work
#
personal computing devices
Millions of consumers commit to regular, ongoing payments in return for continuous access to goods and services.
Story image
As the threat landscape evolves, SASE security models may be the answer
Thu, 3rd Feb 2022
#
mdm
#
advanced persistent threat protection
#
casb
Many organizations lack security solutions for remote employees, according to a new assessment by Check Point Software Technologies.
Story image
TXOne Networks secures industrial operations with latest release
Fri, 28th Jan 2022
#
mdm
#
iot
#
industrial iot
TXOne Networks, a global provider of ICS and industrial IoT (IIoT) security, has launched a new edition of its portable security device.
Story image
Is BYOD the final mile to Digital Transformation success?
Tue, 11th Jan 2022
#
it training
#
data analytics
#
martech
The concept of bring your own device (BYOD) has skyrocketed in popularity as remote and hybrid working becomes the norm. However, security concerns remain.
Story image
The long-tail of COVID-19 and the evolution of ransomware
Tue, 21st Dec 2021
#
malware
#
ransomware
#
mdm
The long-tail of COVID-19 means security teams are having to deal with user sprawl and device sprawl, causing big headaches in 2022.
Story image
What to consider when implementing smartphones in hospitals
Fri, 17th Dec 2021
#
smartphones
#
mdm
#
wireless networks
Smartphone implementation in hospitals is on the rise in Australia and New Zealand, offering significant benefits.
Story image
Samsung outlines cybersecurity strategy for devices
Thu, 2nd Dec 2021
#
mdm
#
wireless networks
#
cybersecurity
Samsung is tackling the rise in cyberattacks on smartphones with its Samsung Knox cybersecurity solution, providing end-to-end protection for users' devices.
Story image
A holistic approach to MDM for security and productive gains
Thu, 4th Nov 2021
#
mdm
#
cybersecurity
#
personal computing devices
Quality device management, from the cloud, has become paramount for ensuring business productivity and continuity.
Story image
The rising importance of mainframe security
Thu, 28th Oct 2021
#
mfa
#
cybersecurity
#
personal computing devices
Mainframe-reliant organisations in Australia and New Zealand must implement multifactor authentication to protect against cyberthreats.