21st Century Learning and Teaching
585.8K views | +7 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'MDM'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | 21st Century Learning and Teaching | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec Empowers Enterprises to Embrace Mobility, BYOD

Symantec Empowers Enterprises to Embrace Mobility, BYOD | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

 

 

However, IT departments tasked with keeping company networks and sensitive data safe are still struggling to get a handle on mobility. According to the same survey, mobility ranks as the leading IT risk among organizations, that includes being perceived as more risky than virtualization and even public cloud computing.

 

===> Device loss, data breach and mobile malware are some of the chief concerns. And these concerns are not unfounded. For the 12 month period leading up to the survey, the average cost of enterprise losses associated with mobility was $429,000. <===

 

To help enterprises take full advantage of mobility while also mitigating the very real risks associated with it, Symantec has built the strongest mobile security and management product portfolio available. Today, we announced significant updates to this portfolio that enhance our already industry-leading capabilities in mobile device management, mobile application management and mobile threat protection.

No comment yet.
Scooped by Gust MEES
Scoop.it!

BrightTALK Webcast - Mobile Security Summit July12

BrightTALK Webcast - Mobile Security Summit July12 | 21st Century Learning and Teaching | Scoop.it

Why Mobile Device Management Needs Mobile Security... A MUST for "Bring Your Own Device" (BYOD)!

 

Read more:

http://www.websense.com/content/brighttalk-mobile-security-webcast.aspx?cmpid=prtw

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Sophos helps businesses embrace BYOD

Sophos helps businesses embrace BYOD | 21st Century Learning and Teaching | Scoop.it

“BYOD is top of mind for myriad organisations; however, it’s causing some concern among IT. The increase in personal devices accessing the network may complicate the process of ensuring devices are secure and compliant with company policies, making it difficult for IT to justify broad BYOD acceptance,” said Stacy K. Crook, senior analyst, Mobile Enterprise Research, IDC. “Solutions with features like those found in the latest version of Sophos Mobile Control allow organisations to develop BYOD strategies without compromising on security, or complicating the overall management of the network.”

 

In addition, if it a mobile device becomes non-compliant, the new release will alert IT, so the administrator can send messages to the user for minor violations. For more serious incidents, the administrator can configure a set of tasks, which will be applied automatically. Examples include corporate or full wipes as well as policy changes to avert any risk for corporate data.

 

Gust MEES: a MUST read for anyone who uses "Bring Your Own Device" (Hashtag for Twitter =#BYOD):

http://www.net-security.org/secworld.php?id=13423

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CSC Assessing the Cybersecurity Landscape in a BYOD World

CSC Assessing the Cybersecurity Landscape in a BYOD World | 21st Century Learning and Teaching | Scoop.it
Managing a company’s IT infrastructure is fast becoming an overwhelming task. Users want anytime, anywhere access. Mobile device management and shrinking budgets add to the burden.

 

 

 

 

Read more to learn about the new trend "BYOD":

 

http://www.csc.com/cybersecurity/insights/85869-aspiring_to_situational_awareness_in_security?ref=hp

 

No comment yet.