Premium Content

Access "Rapid technology changes make securing BYOD difficult"

Published: 31 Jan 2013

As the parent of a high school freshman, I can empathize with IT professionals securing BYOD and trying to wrangle their end users in this era of consumerization. As parents, we spend all kinds of time and effort establishing boundaries and educating our children to be responsible, considerate members of society. But the minute they reach adolescence, they go off and do profoundly stupid stuff behind our backs. It’s the same thing with end users and their smartphones and tablets. All the structure and due diligence that IT has put it place to make a safe, cost-effective and reliable working environment goes out the window faster than you can download a Dropbox app. But just because you don’t like it doesn’t mean you can put a stop to it. Eventually, tighter rules and earlier curfews break down, and teenagers become adults. And end users, for better or for worse, are wielding their own smartphones and tablets, which aren’t going anywhere. Trying to deny this new reality is not only pointless, it’s counterproductive. The good news is that slowly but surely, IT... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Cloud migration confidential

    Any cloud migration strategy will likely start with a good dose of preparation, say experts in the cover story for the September issue of Modern ...

  • DevOps tools for workload management

    Workload automation and streamlined management are essential to support fast-changing business applications and a hybrid or private cloud computing ...

  • The processor problem: One size doesn't fit

    Conventional x86 processors try to do everything, but they are power hungry and performance inefficient. Stripping down processors to get the ...