<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; BYOD</title> <atom:link href="https://www.iphere.com/tag/byod/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Survey: BYOD security remains spotty, with users unaware or unmotivated about risks</title><link>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks</link> <comments>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks#comments</comments> <pubDate>Fri, 03 Oct 2014 08:12:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[remains]]></category> <category><![CDATA[Risks]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[spotty]]></category> <category><![CDATA[Survey]]></category> <category><![CDATA[unaware]]></category> <category><![CDATA[unmotivated]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks</guid> <description><![CDATA[Many organizations have embraced the concept of BYOD (bring your own device), allowing employees to use their own personal smartphones and tablets at work. A new survey from BitDefender, however, suggests that BYOD policies and controls have a long way to go in order to be more secure. The BitDefender study, conducted by Millward Brown, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/survey-byod-security-remains-spotty-with-users-unaware-or-unmotivated-about-risks/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>How Virtualization Can Simplify Your BYOD Strategy</title><link>https://www.iphere.com/how-virtualization-can-simplify-your-byod-strategy</link> <comments>https://www.iphere.com/how-virtualization-can-simplify-your-byod-strategy#comments</comments> <pubDate>Tue, 18 Mar 2014 02:14:13 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA['Simplify']]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Strategy]]></category> <category><![CDATA[Virtualization]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-virtualization-can-simplify-your-byod-strategy</guid> <description><![CDATA[Virtualization technologies can help enterprise IT teams support the new user-centric model created by IT consumerization. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/how-virtualization-can-simplify-your-byod-strategy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The Case For VDI In The BYOD Era</title><link>https://www.iphere.com/the-case-for-vdi-in-the-byod-era</link> <comments>https://www.iphere.com/the-case-for-vdi-in-the-byod-era#comments</comments> <pubDate>Wed, 15 Jan 2014 14:19:37 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Case]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-case-for-vdi-in-the-byod-era</guid> <description><![CDATA[Virtual desktop infrastructure is becoming more attractive in the enterprise as BYOD becomes a way of life and new flash arrays boost VDI performance. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-case-for-vdi-in-the-byod-era/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Book Review: &#8216;Cisco ISE For BYOD And Secure Unified Access&#8217;</title><link>https://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access</link> <comments>https://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access#comments</comments> <pubDate>Wed, 20 Nov 2013 08:12:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Access]]></category> <category><![CDATA[Book]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Cisco]]></category> <category><![CDATA[Review]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[Unified]]></category> <guid
isPermaLink="false">http://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access</guid> <description><![CDATA[For a network engineer planning a Cisco Identity Services Engine deployment, this publication provides valuable technical guidance and practical troubleshooting advice. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/book-review-cisco-ise-for-byod-and-secure-unified-access/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Cloud Services, BYOD Complicating Network Monitoring, Survey Shows</title><link>https://www.iphere.com/cloud-services-byod-complicating-network-monitoring-survey-shows</link> <comments>https://www.iphere.com/cloud-services-byod-complicating-network-monitoring-survey-shows#comments</comments> <pubDate>Tue, 23 Jul 2013 14:16:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Complicating]]></category> <category><![CDATA[Monitoring]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Services]]></category> <category><![CDATA[Shows]]></category> <category><![CDATA[Survey]]></category> <guid
isPermaLink="false">http://www.iphere.com/cloud-services-byod-complicating-network-monitoring-survey-shows</guid> <description><![CDATA[A global poll of IT professionals shows how newer technologies are making it harder to keep tabs on the network. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/cloud-services-byod-complicating-network-monitoring-survey-shows/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>BYOD: Why You Will Lose</title><link>https://www.iphere.com/byod-why-you-will-lose</link> <comments>https://www.iphere.com/byod-why-you-will-lose#comments</comments> <pubDate>Tue, 18 Jun 2013 14:17:10 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Lose]]></category> <guid
isPermaLink="false">http://www.iphere.com/byod-why-you-will-lose</guid> <description><![CDATA[Restrictive BYOD policies will fail because humans have a compulsive attachment to mobile devices. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/byod-why-you-will-lose/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>VMware Fights Android BYOD Headaches</title><link>https://www.iphere.com/vmware-fights-android-byod-headaches</link> <comments>https://www.iphere.com/vmware-fights-android-byod-headaches#comments</comments> <pubDate>Thu, 16 May 2013 14:12:47 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Android]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Fights]]></category> <category><![CDATA[Headaches]]></category> <category><![CDATA[VMware]]></category> <guid
isPermaLink="false">http://www.iphere.com/vmware-fights-android-byod-headaches</guid> <description><![CDATA[VMware announced Wednesday the availability of its Horizon Mobile product for certain Android-based Verizon smartphones. The technology establishes a second instance of Google&#8217;s mobile OS on a compatible device, allowing employees to keep their personal content separate from an IT-controlled workspace. Such partitions have been considered an ideal ever since workers began bringing their own [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/vmware-fights-android-byod-headaches/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>BYOD Security: Do You Really Need MDM?</title><link>https://www.iphere.com/byod-security-do-you-really-need-mdm</link> <comments>https://www.iphere.com/byod-security-do-you-really-need-mdm#comments</comments> <pubDate>Tue, 12 Mar 2013 02:13:50 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Need]]></category> <category><![CDATA[Really]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/byod-security-do-you-really-need-mdm</guid> <description><![CDATA[IT is being stampeded into adopting MDM to protect mobile devices. But it&#8217;s not a silver bullet, and it may be overkill for many needs where conventional wireless network security best practices will suffice. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/byod-security-do-you-really-need-mdm/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>F5 Tackles BYOD with MDM Products and Services</title><link>https://www.iphere.com/f5-tackles-byod-with-mdm-products-and-services-2</link> <comments>https://www.iphere.com/f5-tackles-byod-with-mdm-products-and-services-2#comments</comments> <pubDate>Sat, 09 Mar 2013 20:19:20 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Products]]></category> <category><![CDATA[Services]]></category> <category><![CDATA[Tackles]]></category> <guid
isPermaLink="false">http://www.iphere.com/f5-tackles-byod-with-mdm-products-and-services-2</guid> <description><![CDATA[News roundup: F5 announces MDM software and SaaS service; Citrix leverages Zenprise acquisition to launch XenMobile; GroundWork Monitor watches hybrid cloud environments. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/f5-tackles-byod-with-mdm-products-and-services-2/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>4 Big BYOD Trends For 2013</title><link>https://www.iphere.com/4-big-byod-trends-for-2013</link> <comments>https://www.iphere.com/4-big-byod-trends-for-2013#comments</comments> <pubDate>Sat, 02 Mar 2013 02:16:05 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[2013]]></category> <category><![CDATA[BYOD]]></category> <category><![CDATA[Trends]]></category> <guid
isPermaLink="false">http://www.iphere.com/4-big-byod-trends-for-2013</guid> <description><![CDATA[Last year, research firm Gartner heralded the bring-your-own-device, or BYOD, phenomenon as the &#8220;most radical shift in enterprise client computing since the introduction of the PC.&#8221; Such headlines often smack of hyperbole but so far, BYOD has lived up to expectations. From executives who wanted corporate email access on their iPads to employees who lobbied [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/4-big-byod-trends-for-2013/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>