Articles about Byod

An upset woman with an empty wallet

Customer data security is our highest priori- ha ha ha whatever, suckers

Something for the Weekend, Sir? I would like it to be known that mine is bigger than yours. And yours is bigger than everyone else's. Only losers waste their time with small. We do big. The IT industry is notably keen on letting us know that everything they do is big, especially when it comes to data security breaches. Cyber-attacks on individuals are never …
Alistair Dabbs, 18 Nov 2016
The Register Roundtable Room at The Soho Hotel

CIOs: VDI? Maybe, just maybe, it really will be different this time...

Register Roundtable Sometimes technology visions bubble along under the radar, quite often scorned then, following a change of name or emphasis, ubiquitous. Utility computing became the cloud, and we know how that’s taken off. Groupware became collaboration. Thin clients have morphed into VDI, and… Well, seems like a good time to get a bunch of …
Joe Fay, 11 Nov 2016
Burglar sits in kitchen with stolen tablet. Photo by Shutterstock

Good luck securing 'things' when users assume 'stuff just works'

At the end of April my home was broken into by a professional who silently and systematically looted my residence of all my portable wealth while I slept. In the morning, as I looked around for a phone to call the cops (there wasn’t one, so I had to Skype them from a desktop machine), I saw he’d used an entrance that offered …
Mark Pesce, 27 Oct 2016
Traditional lattice pylons in the UK countryside

Existing security standards are fine for IoT gizmos in electrical grids

IoT World Congress Putting Internet of Things sensors into electricity distribution grids works just fine - and security is catered for by existing broad standards, Luc Hossenlopp, CTO of Schneider Electric’s energy division, told the Internet of Things World Congress today. Addressing a packed auditorium at the Fira de Barcelona conference …
Gareth Corfield, 25 Oct 2016
Embarrassed/exhausted man sits in front of laptop in hipstery office. Photo by Shutterstock

Email security: We CAN fix the tech, but what about the humans?

Last month’s Mr Chow ransomware attacks serve as a timely reminder that security should be at the top of any business IT strategy. Ransomware is on the increase, at least according to the FBI and while it is not all email borne, it is an example of how sophisticated hackers and criminals are getting with technology. Certainly …
Desktop as a service

No, software-as-a-service won't automatically simplify operations and cut costs

Software-as-a-service (SaaS) is sold to line of business people as a way to get the applications they need, without all the hassle, time and expense required to have an IT department build and run an application. But while off-the-shelf SaaS can do an awful lot for a business, doing SaaS well needs ancillary tools that SaaS …
Simon Sharwood, 11 Oct 2016

Psst. Need some spy-on-employees tech? Ask Oriium

IPExpo Yorkshire-based "IT solutions" firm Oriium was hawking its CX:inSync spy-on-your-employees platform at ITExpo Europe today. Its cx:inSync product is sold as an endpoint device management solution. Its big selling point is the ability for network admins to implement deduplicated backups of end-user devices. Bundled with that …
Gareth Corfield, 05 Oct 2016

Invasion of the Brandsnatchers: How Nokia and BlackBerry inhabit the afterlife

Analysis Early next year you should able to buy Nokia phones and BlackBerry phones, two of the giant names of the Noughties. None of these phones will be made by Nokia or BlackBerry, and all of them will be Android phones. The famous brands will inhabit new bodies, with the licensees hoping to rekindle some nostalgia both giants once …
Andrew Orlowski, 30 Sep 2016
Macbook 2015. Pic: Apple

Ditch your Macs, Dell tells EMC staff

Exclusive Staff at EMC who go out into the world to meet customers have been told their Apple Macs aren't allowed to come with them. Amid Dell's looming takeover of EMC, an edict has been issued insisting that Dell customers must only ever see Dell laptops during meetings and consulting engagements, EMC insiders have told The Register …
Simon Sharwood, 29 Jul 2016
Cheban's blingy watch

Sirin Labs' Solarin isn't for pro-privacy bankers. It's for rich execs who want bling

El Reg got hands-on with the Solarin $14,000 ultra-high-end Android smartphone during a trip to Tel Aviv this week. As previously reported, the Solarin handset is an Android-based smartphone pitched at privacy-conscious executives and the ultra-wealthy. The smartphone comes with a 24 megapixel camera and integrated 3D audio …
John Leyden, 20 Jun 2016

VMware aims high with a little help from its friends

VMware's extensive ecosystem has been a massive part of its success, as demonstrated by the fact that even when server virtualisation looked like a reason to stop buying servers it created an opportunity for Intel to make virtualisation sing and arguably left Chipzilla making more coin from virtualisation than VMware itself. …
Simon Sharwood, 14 Jun 2016
Screenshot from the movie Airplane!

In-flight movies via BYOD? Just what I always wan... argh no we’re all going to die!

Something for the Weekend, Sir? It’s sunny outside, which can mean only one thing: I am about to go on holiday to a place where it will be pissing down with rain and sleet for the next fortnight. My globetrotting exploits have been limited this year, so I’m looking forward to enjoying my first experience of in-flight entertainment via Wi-Fi to my own device …
Alistair Dabbs, 27 May 2016
A view from Babbage's eye-mounted Picam

'Droid Gmail on Exchange

Google's Gmail client for Android now supports Microsoft Exchange. Google says an update that will roll out over the next few days will "support users using dual delivery mail flow or calendars with Microsoft Exchange. Sysadmins can likely look forward to a BYOD barrage as Android users start to aim their devices at Exchange …
Simon Sharwood, 26 Apr 2016

OK, so the users want corporate apps on the move. Don't Panic

People want to be able to do their job from wherever they happen to be. It's understandable – if you don't need to be in an office chained to your desk then why not work somewhere more convenient? Let's look at five ways to make this achievable. Remote access to local apps At the most basic level you have the traditional …
Dave Cartwright, 30 Mar 2016
Amazon WorkSpaces on an Apple iPad

Amazon WorkSpaces two years on: Are we ready for cloud-hosted Windows desktops?

Amazon Web Services (AWS) released WorkSpaces, Windows desktop-as-a-service, towards the end of March 2014. We took an early look, but encountered several niggling problems. "Don't dive in: it will get better," was my conclusion. It is time for another hands-on, but first a quick recap. WorkSpaces provides a Windows desktop …
Tim Anderson, 28 Mar 2016

Going on a thin client diet

We may not be in the post-PC age, but we’re definitely in the ‘plus everything else’ era. A gaggle of new mobile devices has gathered to join the PC, and it’s making things more complex for IT administrators. Smart phones were already heavily in the enterprise, and now, tablets are gaining traction too. How can they cut through …
Robin Birtstone, 08 Mar 2016
Couple holding hands. Pic: Marina Aguiar

Israeli security firms Check Point, CyberArk in talks – report

Israeli security firm Check Point is reportedly in preliminary talks with local rival CyberArk about a possible acquisition/merger. Rumours of the courtship surfaced in Hebrew-language Israeli financial newspaper TheMarker on Wednesday, and lead to twitterings in some quarters that we were about to witness the birth of some …
John Leyden, 13 Jan 2016

The Register's Australian technology headline predictions … for 2017!

December is the time when vendors' Australian outposts try to position their managing directors as sages and oracles, and rain down predictions on El Reg's antipodean outpost. Vulture South trashes them all promptly, secures supplies of amber fluid and starts thinking a year further ahead, to the year after next. After due …
Simon Sharwood, 20 Dec 2015
Developer in a rage

Bringing discipline to development, without causing pain

There’s that question you’ve always wanted to ask in an interview when the dialogue has gone really well and you know you’re about to get offered the job, but you don’t want it anyway. Interviewer: “Great, so do you have any questions that you would like to ask me?” Candidate: “Well, if I’m traveling in a car at the speed of …
Shouting match

Aribba Aruba, screams HP exec, 'now we'll scalp Cisco'

Aruba execs have floated to the top of HP’s UK networking management stack, and to stay there or rise further in the wider group they’ll have to give undisputed sector daddy Cisco a bloody nose. The wireless networking firm that cost HP $3.5bn to buy was integrated recently, with Aruba old timer Bob Vickers and Andy Clark …
Paul Kunert, 27 Oct 2015
Empty phone battery

BYOD battery bloodbath? Facebook 'fesses up to crook code

If you've gone down the bring your own device (BYOD) route and your users are always complaining about battery life, Facebook has just explained why: its iOS app sucks … ridiculous amounts of power. The Social Network™'s engineering manager Ari Grant took to his own platform to note “reports of some people experiencing battery …
Simon Sharwood, 23 Oct 2015
Turnbull's twitter feed by https://www.flickr.com/photos/paullyoung/  https://creativecommons.org/licenses/by/2.0/

Australian government Slacks off in cabinet

Australia's fully-mobile-enabled BYOD prime minister Malcolm Turnbull is reportedly working hard to keep discussions between members of Cabinet out of the reach of the country's data retention regime. Turnbull, whose tech credentials include running his own Hillary-Clinton-style e-mail server and using the encrypted …

How to evade Apple's anti-malware Gatekeeper in OS X and really ruin a fanboy's week

The myth that Macs are inherently more secure than Windows PCs has taken another hit. Patrick Wardle, a former NSA staffer who now heads up research at crowdsourced security intelligence firm Synack, has found a new route around Apple's defensive Gatekeeper technology. Apple's Gatekeeper utility is built into OS X, and is …
John Leyden, 01 Oct 2015
Apple iPad Air

Nice try, Apple. The Maxi Pad is no laptop killer – and won’t scratch the Surface

Apple’s Maxi Pad is no laptop or Surface Pro killer – even though it holds up comparatively well for general workforce usage. This is the prognosis from some in the analyst community and those who will compete against it. The view from the Mac channel understandably differs somewhat. A relatively late market entrant - not …
Paul Kunert, 22 Sep 2015

Bible apps are EVIL says John McAfee as he phishes legal sysadmins in real time

If there's a difference between John McAfee and Eugene Kaspersky in their public speaking behaviour, it's more in their tones of voice than in the paranoia of the message. Perhaps because he's 70 years old (or perhaps because he's practicing a presidential bearing), McAfee speaks more slowly and more quietly than Kaspersky. …
David Cameron

What Reg readers really think will affect IT in the next three years...

Temperature Check The rate of change in IT and business has never been more rapid. When it comes to how your organisation uses IT, standing still is not an option. But keeping track of advances in technology and the new solutions becoming available in the market place isn’t always that easy, and few Reg readers have the time or resources to …
Tony Lock, 16 Sep 2015

IoT/BYOD Topic of the Week: Which Channel 5 news minx was HOTTEST?

AI neural network Data Scoop Well, it's been something of a week: and one of the main tech news events, like it or lump it, has been the appearance of the Apple MaxiPad - aka the Apple Surface Pro, or even in some circles iPad Pro Air Beats. Naturally the forecast appearance of the strokable whopper led us here at the Register to speculate on the target …
Lewis Page, 11 Sep 2015
Skull in an Apple by https://www.flickr.com/photos/walkn/ https://creativecommons.org/licenses/by/2.0/  CC 2.0 attribution generic

Half the Fanbois in your office are unpatched ATTACK VECTORS

Duo Labs researcher Mike Hanley says one in two iPhones connected to corporate networks are running outdated versions of iOS. The poor patch performance means half of all iDevices are corporate attack vectors running April's iOS version 8.3 or lower, and as a result are brimming with more than 100 vulnerabilities. Almost a …
Darren Pauli, 11 Sep 2015
The Starship Enterprise

Windows 10 to grow up, turn extra enterprise-y beginning this month

Microsoft says features of Windows 10 for enterprises that weren't available when the OS launched in July will begin rolling out this month. As was the case with the Windows 10 launch, subscribers to the Windows Insider program will get first crack at the late add-ons, which won't reach general availability until later in the …
Neil McAllister, 08 Sep 2015
Windows 10 floppy disk

VMware bids to bust out of servers and onto Windows desktops

VMworld 2015 VMware's trying to put itself into the Windows desktop management business with its AirWatch mobile device management and identity management products. AirWatch is best known as a way to manage and deploy apps to mobile devices, based on user profiles that determine what users are allowed to run and/or the resources they are …
Simon Sharwood, 01 Sep 2015
angry_woman_mobile_cropped_648

BYOD? More like CYOD as companies still set the parameters

Companies are rapidly expanding the volume of mobile devices used by their employees. The number of devices enrolled in business grew by 72 per cent during the whole of last year, compared with 2013. Moreover, a Good Technology survey in the first quarter of 2015 found 72 per cent of those devices ran iOS, 26 per cent Android …
Andy Favell, 25 Aug 2015
Intel compute stick

Intel's Compute Sticks stick it to Windows To Go, Chromecast

Quick review "Little Stick. Big Surprise." That's what Intel says about its Compute Sticks, the new 'smaller than an iPhone' mini-PCs designed for portability and ease of use The Intel Compute Stick (ICS) is perhaps best thought of as the mutant offspring of a Raspberry Pi on steroids and Google Chromecast. The offspring emerges as a tiny …
Adam Fowler, 20 Aug 2015
shutterstock_271979432-classroom

So unfair! Teachers know what’s happening on students' fondleslabs

Maybe now you don’t want the kids turning off their iPads in class after all. By using VNC remote access, pupils can now instantly share their work with their teacher and the rest of the pupils. The ability has come through the integration of software from Cambridge company RealVNC, which allows screens to be mapped on to …
Simon Rockman, 17 Aug 2015
Sim card

A dual-SIM smartphone in your hand beats two in the bush

Smartphones packing two SIM slots are set to grab a third of the overall smartphone market, according to Strategy Analytics. Dual-SIM phones are already big business, the firm reckons, with about 431 million of the devices to ship this year. Come 2016, the firm says, expect 19 per cent growth to take the dual-SIM total to …
Simon Sharwood, 21 Jul 2015

The Escalating Mobile Security Challenge

Just as IT professionals and others responsible for mobile security have come to terms with BYOD, the problem has moved on, with the lines between business and personal activity blurring even more. Against this background, effective management of mobile risk will increasingly require a user-centric approach. Soothsayers …
Dale Vile, 17 Jul 2015
Sheep, image via Shutterstock

Feel like you're being herded onto Windows 10? Well, you should

Comment Roll up, roll up for Windows 10, the greatest show on Earth! Forget everything you think you know or might have heard. THIS changes everything. Windows 7 and Windows 8? Pah. THIS is the one you want. Yes, the bandwagon on the Windows 10 hype machine is trundling along, and its online followers are hailing its game-changing …
Gavin Clarke, 16 Jul 2015

$125m VC war chest awaits NTT Com Security's outgoing boss

The hedge fund that outgoing NTT Com Security overlord Simon Church is joining has $125m to splash on new investments in cyber defence and data services. Church, who provided consultancy for C5 Capital since its inception last year, and was made an advisory board member in April, is to become an "exec in residence" at the …
Paul Kunert, 24 Jun 2015
keyboard with 'Help' key

Employees love their IT departments (almost very nearly true)

Haters gonna hate, but not corporate employees who actually quite like the support their IT departments provide. That’s according to a survey of 2,500 staffers in Australia, France, Germany, the UK and the USA that landed on our helpdesk this week. When asked to give a letter grade, more than 80 per cent of respondents gave …
Drew Cullen, 17 Jun 2015
Students using MacBooks in a lecture hall

Scientists love MacBooks (true) – but what about you?

Sysadmin Blog I've done a few Apple in the enterprise articles recently, and it has set me thinking. Despite Apple's obvious success in a number of areas, a fair amount of nerdly vitriol is spewed at Macs. I have had a few unkind words to say about them*, but the arguments can get quite heated. Some of the particular debate points used by …
Trevor Pott, 10 Jun 2015
ISO7816 Tattoo

Online identity woes can only be solved through the medium of GIF

The Global Identity Foundation aims to recruit vendors in its ambitious quest to develop a global digital identity ecosystem. GIF is seeking to develop a new, global solution for digital identities, with the not-for-profit organisation building on work from the Jericho Forum, including the Jericho Forum’s Identity, Entitlement …
John Leyden, 10 Jun 2015
Monks at their laptops

Shine a light on the rogue IT that hides in the company shadows

The rapid development of technology over the years has brought us a culture where people use technology wherever they are and whatever they are doing. Only 20 years ago a portable PC or Mac that you could use to work on the move was very expensive, and if you wanted to do serious work on a spreadsheet then you had to drive into …
Dave Cartwright, 10 Jun 2015

IoT DANGERS: BYOD’s trashier cousin becoming a right tearaway

Bring Your Own Device is problematic enough, but now staff are increasingly bringing inherently insecure, internet-connected smart devices into work, making a mockery of established security policies in the process. Staff and bosses bringing their own smartphones and laptops into enterprises can be managed using mobile device …
John Leyden, 03 Jun 2015
Legoland Windsor Knight's Kingdom

Spoiling staff with toys could turn against your business

Many companies put staff engagement high on the agenda: they reason that if you keep staff happy they are likely to be productive and stick with you through difficult times as well as when it is all going swimmingly. It is a perfectly sensible thing to do – so long as you involve the IT department in the process. My first IT …
Dave Cartwright, 02 Jun 2015
Our happy travellers surrounded by armed police at LAX

Governance the key if you don't want mobile workers escaping your control

Mobile computing is great. No longer are we chained to our desks when using technology and doing proper work. Not only are laptops getting smaller, lighter and cheaper, it is also possible to do real, productive stuff even more freely using phones and tablets. As is always the case in computing, though, the positives of …
Dave Cartwright, 21 May 2015
The Citrix X1 Mouse

Rodent rescue reckoned as remedy for cursor crisis cruelling BYOD

Citrix will next week release a mouse. The company floated the idea back in January when it released a “limited edition” X1 Mouse. The thinking behind the mouse, then and now, is that lots of organisations want to pipe Windows apps into iPads and the like, but it's hard to use a GUI designed for a mouse with your finger. …
Simon Sharwood, 08 May 2015

DEFCON 23 to host Internet of Things slaughterfest

The Internet of Things (IoT) will, come August, be torn apart in a new hacking slaughterfest announced for DEFCON 23. The contest run by the brains behind the router-smashing SOHOplessly Broken challenge aims to stain the carpet with the blood of internet accessible gadgets and junk as hackers tear apart devices to capture …
Darren Pauli, 06 May 2015

Watch out for the products that have snuck in behind your back

The mention of shadow IT can produce beads of sweat on the brow of any knowledgeable IT staff member. For those who do not know, the term covers any company systems and services that are not procured by the IT department. The toil and trouble of a single shadow IT occurrence can cause a headache that sticks with the company …
Adam Fowler, 24 Apr 2015
sea_hp_sink

Atalla the hun(ter) leads HP cloud security invasion

HP has revealed a bunch of security analytics tools and services as part of an infosec portfolio launch. The company reckons the IT industry isn't keeping up with security threats, so it's pushing a focus on “the interactions between users, applications and data”. To that end, there's additions to ArcSight, a new cloud …
Android icon desktop toys

Android finally shows up for work, app in hand

Google has finally published its BYOD app, Android for Work, adding to the already schizophrenic work-life balance environment for the devices. The software has just popped up on Google Play, where it’s described thus: The Android for Work app provides the ultimate solution to get work done on your Android device and …
Simon Rockman, 17 Apr 2015

There’s a whole mobile world out there – here’s how to manage it

Promo You can retreat into the server room all you like, but we all know that dealing with your users’ mobile devices is an essential part of keeping your company’s systems up and running these days. That applies whether your raison d’etre is boosting end-user productivity, worrying about security or simply driving down costs. So …
Team Register, 16 Apr 2015