Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center at PC Connection
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC for PC Connection, Inc. Solutions and Services Division
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More

BYOD

We have searched the depths of our blog to provide you with the latest IT articles on BYOD. Get Connected Today!
Cybersecurity Best Practices

Best Practices to Improve Cybersecurity

They May Be Simpler than You Think

by Stephen Nardone | 07.06.16

The threat environment—i.e. malware and zero-day attacks, drive-by downloads, watering hole attacks, and denial and distributed denial of service (DoS/DDoS) attacks—is worsening, and the news and analyses paint a dismal picture for cybersecurity: it’s not a case of if you’ll be attacked, but when. However, making your environment more secure—and if not eliminating, at least drastically reducing your risk—is achievable by implementing the appropriate policies, practices and technologies.

Tags:BYODCybersecurityDoSHIPAAHITECHIDCMalwareNetwork VirtualizationPCISDNSecurity breachesSecurity SolutionsSecurity-Policies

Dell Partner Direct Premier Healthcare IT

Mobility, Data, and Security in Healthcare

Take Endpoint Security to a New Level

by Bill Virtue | 04.27.16

Mobile productivity continues to be a rising demand in healthcare as doctors, nurses, medical students, and other healthcare professionals need access to patient data. And health organizations must also address the fact that many healthcare professionals want to use their own devices to access this data. To balance mobile device productivity with patient privacy, endpoint security and compliance are critical for every healthcare organization.

Tags:BYODComplianceEndpoint SecurityMobility SolutionsPC ConnectionPodcast

Mobile Device Security

Implement Mobile Device Security

Stay Secure While Staying Productive

by Stephen Nardone | 04.22.16

The mobile revolution has essentially handed responsibility for device management and security to your users. This may sound terrifying, but it doesn’t have to be. As long as you have a solid mobile device security strategy that is based on best practices and implemented consistently across the enterprise, you can successfully combat the risk involved in enabling mobile productivity.

Tags:BYODDeviceITMobile Device ManagementMobile devicesPC ConnectionSecurity

Developing Your Mobile Strategy

Overlook Enterprise Connectivity at Your Own Risk

by Stephen Nardone | 04.18.16

Just as the security ecosystem of an organization is dependent on the sensitive data that they are trying to protect, so too does an enterprise’s mobile strategy depend on the end goals of the business. Each organization will have its own mobile strategy that is a product of thoughtful input from not only IT, LOB managers, and CIOs but also security professionals.

Tags:BYODITMobile Device ManagementMobile devicesMobilityNetworkNetworkingPC Connection

Microsoft Exchange Upgrade

How to Make a Smooth Microsoft Exchange Transition

What You Need to Consider before Upgrading

by Rick Sabarese | 04.04.16

With better integration in the Microsoft environment and an increase on storage, the reasons to implement the latest version of Exchange 2013 are plentiful.  The latest version of Exchange offers data security, compliance, eDiscovery, mobile and BYOD devices use, and IT management.

Tags:BYODMicrosoft ExchangeMicrosoft Office 365MobilitySecurity

Subscribe
Follow Us
RSS Feed
Featured Bloggers
Tim Allen - Networking Practice Manager
Networking Practice Manager at PC Connection
Stephen Nardone - Director of Security Solutions and Services
Practice Director, Security and Mobility
Josh Sutelman - Adobe Business Development Specialist
Adobe Business Development Specialist
Tag Cloud
Loading Loading...