Gartner is now encouraging people-centric IT practices so IT is no longer seen as a hindrance and rather an enabler.
Researchers are warning companies that the use of MDM technology opens up a loophole in protections added to Apple's iOS 9 to help prevent employees from downloading malicious software posing as legit enterprise apps.
Having to carry around two mobile devices - one for personal use and the other for corporate business - is an anachronism, says Sebastian Goodwin.
Containerisation - separating business and personal data and apps - is an effective way to ensure BYOD doesn't compromise corporate data security says David Brady.
Decide on your mobiles policy, then choose the technology that allows that policy to be delivered says Sergio Galindo.
Mobile Application Management, with secure access and separation of work and personal use can establish employee trust in a company's BYOD policy says Alan Hartwell.
Vast volumes of data are travelling to work and back each day stored on employee devices, but in many cases even the most basic protection policies are not in place explains Kelly Brown.
David Reed explains the 'corporate owned, personally enabled' approach taken by PA to manage the mobile devices used by its employees.
A study from BT reveals that almost half of UK firms (41 percent) suffered a mobile security breach over the last year, with another fifth reporting as many as four incidents in the same time-frame.
Security strategy to prevent mobile data loss involves careful considerations regarding the user, device, and network. Mike Raggo advises implemening a range of controls including use of an enterprise mobility management platform.
What are the risks posed by apps and hardware that cross the business/home divide? Dr Guy Bunker asks what policies and security approaches are required?
First step, identify jailbroken devices on your network, says Vince Arneja, then alter data processing and execution modes to protect your data.
The CESG, the security offshoot of GCHQ, has published in-depth guidance for users of laptop, tablet and smartphone operating systems, offering specifics on how to deploy and use the operating systems on a mobile platform.
Jamie Bodley-Scott asks, how can organisations protect data on mobile devices if the MDM market were to die - as some suggest it might?
New poll shows 94 percent of IT security professionals use third party apps on their mobile devices making it harder for IT to track and manage.
Speakers at this week's RSA Conference in San Francisco stressed that the Bring Your Own Device (BYOD) trend is changing - not ending.
Context-aware security can make intelligent decisions while allowing mobile users to get the job done.
Businesses can accept employee device promiscuity without causing difficulties for IT management, says Centrify's Darren Gross.
Enterprise mobility adoption is on the upswing in the UK and Europe, but serious concerns linger on security and privacy.
McAfee CTO Raj Samani advises companies to secure the business data before the device being used to access the information.
Mobile device management (MDM) start-up vendor AppTec has announced the launch of its Enterprise Mobile Manager technology with a small business offering of 25 free licences.