Posts tagged with ‘BYOD’

  • VMworld Survey: Working habits of your remote/mobile workforce

    I went around to lots of attendees at VMworld yesterday hoping they’d share some of their working habits outside...

  • How Safe is Your SmartPhone? Phone Theft Rising Year Over Year

    Stats from city crime files show that phone theft is rising every year. Cell phones are now stolen in...

  • 3 Blind Spots In Enterprise Data Governance

    This post is based on a recent webinar hosted by CIO.com featuring Deborah L. Bulkeley, Senior Managing Editor, IDG...

  • Protect the Data, Not Just the Device

    Over the past few years, there has been an explosion of endpoints - laptops, tablets, and smartphones - in...

  • BYOD: Caught Between a Rock and a Hard Place

    Today, Bring Your Own Device (BYOD) policies allowing users to access corporate data from personal devices, and cloud-based applications...

    By in Industry Insights02-08-2013
  • Data of Record is Critical for Endpoint Data Governance

    It used to be straightforward for organizations to understand what happened with their data. Data was stored on servers...

    By in Industry Insights27-06-2013
  • Endpoint Devices & the Battle for Data Security

    As printed in Healthcare Global magazine The daily process of treating patients has been compared more than once to a...

    By in Industry Insights13-06-2013
  • why file sync and sharing is not backup

    File Sync and Sharing is Not Backup

    As today’s employees increasingly bring their devices into the office, and as the office becomes more mobile, the ways...

  • What's keeping CIO up at night

    What is keeping the CIO up at nights?

    Druva CEO Jaspreet Singh spoke to ZDNet about the topics that keep him up at night. By Gery Menegaz,...

    By in Industry Insights19-04-2013