F5 Recent End-of-Life Announcements: Upgrade to BIG-IP iSeries RecommendedView F5 EOL Products

Close

Check Point and Gigamon: An Integrated Solution to Find and Mitigate Attacks

In this post: Learn how to adopt a fully integrated cybersecurity solution using the joint defense solution created by Check Point and Gigamon.  As security threats continue to increase in both volume and sophistication, organizations must start rethinking the way they approach cybersecurity. Workplace trends—like bring your own device (BYOD) and the increase in mobile [...]

June 13th, 2018|Categories: BYOD, Cybersecurity, Security|Tags: , |

5 Things To Do Before You BYOD

The company-issued Blackberry died, and no one cared. According to a 2014 Webroot survey (PDF), 61% of companies support bring your own device (BYOD) or the use of employee-owned devices for company functions. Because we no longer control every device, how can we implement BYOD security to keep users and, perhaps more importantly, company data [...]

December 11th, 2014|Categories: BYOD, Security|Tags: , , , |

BYOD Security Risks

Here's a statistic that would alarm any CIO: Almost half of employees have accessed corporate data while browsing unsecured public networks, and most employees never report any missing or stolen BYODs until later. With personal security already being breached via large retailers and popular online sites, it does not ease the minds of CIOs to [...]

June 20th, 2014|Categories: BYOD, Security|Tags: , , , |

Olympic Solutions: IT Security Challenges at the 2014 Winter Olympics

The XXII Olympic Winter Games will showcase 90 competitive events in 15 different sports. Athletes from around the world set cultural and political boundaries aside to participate in spirited, patriotic competition. For many, the Games are a symbol of what the world can be when we work in cooperation toward a common goal under the [...]

February 4th, 2014|Categories: BYOD, Security|Tags: , , , |

Mobile Device Management: Keeping BYOD Policies Secure and Companies Out of the Courtroom

With the recent rise in popularity of "bring your own device" (BYOD) policies at companies across the world, many technology leaders are finding themselves in legal binds after improperly setting company guidelines for mobile device management. CIO.com reports that in the last few years, companies found themselves in legal trouble after writing "overly broad policies [...]

BYOD Policies to Prevent BYOD Threats

In this post: Learn about a rising trend in the workforce, BYOD, and how companies can institute effective BYOD policies. The Balancing Act: Flexibility or Security? The balancing act between freedom and control is not a new issue to people of the 21st century. We see this struggle daily in government, politics, and even with [...]

December 31st, 2013|Categories: BYOD, Security|Tags: , , , |

Infographic: BYOD Friend or Foe?

Bring Your Own Data (BYOD) is a hot topic in today's IT world. As you step into the new year, it's time to consider how your BYOD practices may be jeopardizing your company's security.  The below BYOD infographic will shed some light on top concerns and best practices. With the ever-changing IT landscape, you need [...]

December 18th, 2013|Categories: BYOD, Security|Tags: , , , |