Asia's leading source of security and threat news
BYOD / Bring Your Own Device
These search results are from across the Techday network of sites
The ultimate network security audit checklist
Experts project that losses and damage from cybercrime will skyrocket, with attacks ranging from spam and phishing to malware and spyware — all compromising the safety of sensitive data and proprietary information. These attacks can be minimised by performing network security audits regularly.
Why zero trust remote networking is key to thriving in the ‘new normal’ business world
With so many question marks over the road ahead, enterprises need a solution that enables flexibility to work in any environment, as they try to acclimatise to the ‘new normal', writes Bitglass CTO Anurag Kahol.
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.
The SASE triangle: How a CASB protects managed apps
Enterprises that fail to adapt to the modern business world when it comes to security are likely to fall prey to data breaches and experience a host of other problems, writes Bitglass product marketing manager Will Houcheime.
Bring Your Own PC security to transform businesses within five years - Gartner
“Prior to the COVID-19 pandemic, there was little interest in BYOPC."
BYOD security in remote work era still riddled with issues
Bitglass’ 2020 BYOD Report suggests that BYOD and personal device security in organisations still leave much to be desired, even as more organisations adopt flexible BYOD arrangements.
All we need to know about reverse proxy
To misquote George Orwell, not all cloud access security brokers (CASBs) are created equal.
Network access control market boosted by remote work trend
The global NAC market is estimated to reach $2.21 billion by 2024, finds Frost & Sullivan.
Should we really trust those ‘trusted’ devices?
A false sense of security surrounds so-called trusted mobile devices and we need to rethink the ‘trusted’ device security model.
The BYOD juggling act: balancing security, privacy and mobility
Left unmanaged, personal devices and unmanaged cloud applications can lead to data loss, but if managed too strictly, the IT team risks a backlash from unhappy employees, Bitglass says.
The cost of securing BYOD with mobile agents - Bitglass
A security solution like mobile device management (MDM) fails to respect user privacy and should not be a common security practice.
CrowdStrike: Best practices for mobile device security
The workforce is more reliant than ever on business-critical applications, which can access confidential information from multiple devices at any time and anywhere.
Businesses failing to secure BYOD - Bitglass
Report finds that 74% of organisations allow BYOD but nearly half lack clear security policies and best practices.
Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Achieving uncompromising security without compromising privacy
This is an age where it is critical to achieve comprehensive cybersecurity without invading users’ privacy, hindering their mobility, or impeding their efficiency.
How to combat human error in cyber risks
It’s an old adage in security that people are the weakest link – mostly because of human error.
Why endpoint security is critical in a post-perimeter era
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.
Three ways to achieve data security whilst enabling BYOD
"A mobility strategy is now more important than ever before, that said, selecting the right one is often no small task."
Is BYOD an expensive mistake for your business?
Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones.
Venafi announces new enterprise endpoint management solution
Organisations must provide mobile devices of all types with secure machine identities that support authentication, encryption and decryption.
Westcon-Comstor first local distie for Bitglass
Bitglass is continuing its expansion into APAC with it’s first distribution partnership in New Zealand.
57% of enterprises suspect their mobile workers have been hacked
iPass has released the results of a survey that sought to determine how companies are dealing with the trade-off between security and mobile workers.
Achieving better security for BYOD workplaces
In the early days of BYOD, many organisations looked to mobile device management (MDM) for security.
25% of firms fail to implement multi-factor authentication for BYOD
25% of respondents at the Gartner Symposium lacked some form of multi-factor authentication when securing BYOD.