James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand - Director of Practices and Initiatives for Enterprise Storage
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More

BYOD

We have searched the depths of our blog to provide you with the latest IT articles on BYOD. Get Connected Today!

Keeping Your Network Secure in a BYOD Environment

It Doesn’t Have to Be a Headache

by Bob Perciaccante | 11.26.13

Hard to escape these days is the trend toward bring your own device (BYOD). Many end-users now own consumer grade devices that nevertheless have comparable computing power to their work devices, and now they want to use their own devices to get work done. Organizations want happy, productive employees, so BYOD seems like a winning strategy, but how do you keep your network and your data secure when you open up access to new devices? Here are some important considerations, tips, and advice on how you can implement BYOD at your organization—and keep your data secure.

Tags:BYODWireless

BYOD Network of Devices and Applications

BYOD and Your Network

Are You Ready for a Flood of Devices?

by Tim Allen | 09.18.13

Is your network infrastructure ready for a BYOD initiative? If your network was designed and implemented five years ago or more, the answer is, unfortunately, probably not. When your network infrastructure was implemented, your team understood how many individuals would be accessing the network because you were controlling how many devices were handed out. With a BYOD strategy, you’re opening the door to many more devices—and many more applications being used on those devices. If you’re thinking about implementing BYOD at your organization, it’s time for your network strategy to evolve. 

Tags:BYODInfrastructureNetworking

BYOD Security

BYOD, Security, and You

Make Sure You Cover All Your Bases

by Rich Faille | 09.06.13

By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

Tags:BYOD

2013 Outlook on Technology: BYOD Survey Results

Our BYOD Survey Results Are In

Security Is Everyone’s Top Concern

by Kelly Schuttinger | 08.19.13

Here at PC Connection, we recently conducted a survey to gain deeper insight into the BYOD marketplace. We surveyed 500 IT professionals at organizations of various sizes, and today I’d like to share some of our key findings.

As with most BYOD research, we found security to be the top concern among organizations.

Tags:BYODMobilitySecurity

Can Your Network Handle BYOD?

Get Your Infrastructure Up to Speed

by Mike Glew | 08.16.13
Like many IT professionals, you are probably evaluating your wireless network’s ability to support new applications and meet user expectations for mobility and BYOD. As more organizations move toward implementing a BYOD policy, legacy wireless networks will struggle to keep up. Here are some insights and steps you can take to prepare for the influx of mobile devices that place increasing demands on your wireless network, while keeping everything secure.

Tags:BYODNetworkingSecurityWireless