Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors

BYOD

We have searched the depths of our blog to provide you with the latest IT articles on BYOD. Get Connected Today!
Mobile Device Security

Implement Mobile Device Security

Stay Secure While Staying Productive

by Stephen Nardone | 04.22.16

The mobile revolution has essentially handed responsibility for device management and security to your users. This may sound terrifying, but it doesn’t have to be. As long as you have a solid mobile device security strategy that is based on best practices and implemented consistently across the enterprise, you can successfully combat the risk involved in enabling mobile productivity.

Tags:BYODConnectionDevicesITMobile Device ManagementMobile devicesSecurity

Microsoft Exchange Upgrade

How to Make a Smooth Microsoft Exchange Transition

What You Need to Consider before Upgrading

by Rick Sabarese | 04.04.16

With better integration in the Microsoft environment and an increase on storage, the reasons to implement the latest version of Exchange 2013 are plentiful.  The latest version of Exchange offers data security, compliance, eDiscovery, mobile and BYOD devices use, and IT management.

Tags:BYODMicrosoft ExchangeMicrosoft Office 365MobilitySecurity

2016 Mobility Survey

The Future of Enterprise Mobility

How did your peers respond?

by Stephen Nardone | 04.01.16

Are you curious about what the coming year has in store for enterprise mobility? Connection collaborated with IDG the world's leading IT Research Company, and asked IT decision maker’s three questions about the latest trends in mobility. What did your peers have to say? Here are some of the highlights from the survey:

  • Almost 60% of IT decision makers report network vulnerabilities are among their top ranked mobile security concerns

  • 58% of IT decision will continue supporting BYOD in 2016

  • 35% of IT decision makers have their Mobile Device Management plan under evaluation

Tags:BYODConnectionITMobilitySecurity

Mobile Device

Going Mobile Beyond the Checklist

Four Mobility Missteps That Are Easily Avoided

by Stephen Nardone | 02.23.16

Here are four of the most common ways organizations fumble their mobile deployments, and what you can do to prevent them. 

Tags:BYODDevicesITMobilitySecurity

Security Threats to Mobile Devices

Hackers Swarm to Mobile Devices

Know Your Threats

by Stephen Nardone | 02.04.16

As IT struggles to get out in front of enterprise security risks, mobile devices are adding another wrinkle to defense plans as they become an increasingly active attack vector.

Not long ago, IT’s primary security mission was centered on locking down the desktop and creating a tight perimeter around the network to safeguard enterprise data assets. Then came the influx of smartphones and tablets and everything changed. Thanks to rise of the Bring Your Own Device (BYOD) movement, Gartner is predicting the primary endpoint breach to be tablets and smartphones by 2017, with the majority of transgressions tied to mobile application misconfiguration and misuse, not traditional technical attacks.

Tags:BYODGartnerITMalvertisingMDNMobile Device ManagementMobile devicesPassword ProtectionSecuritySmartphonesTablets

Subscribe
Follow Us
RSS Feed
Featured Bloggers
Stephen Nardone - Director of Security Solutions and Services
Practice Director, Security and Mobility
Jennifer Ramstrom - VP Vertical Strategy and Business Development
VP Vertical Strategy & Business Development
Kevin O'Connor - Senior Director, Cloud Solutions Group
Senior Director, Cloud Solutions Group
Tag Cloud
Loading Loading...