JBuff’s BYOD Experiment (part 1 of 4) Acquisition Challenges
One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to...
View ArticleJBuff’s BYOD Experiment (part 2 of 4) Getting Started
A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s...
View ArticleJBuff’s BYOD Experiment (part 3 of 4) Corporate Expectations
A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s...
View ArticleData Protection in a BYOD World
One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets). Frankly, most IT organizations weren’t able to do an...
View Article
More Pages to Explore .....