Mobile Security

Is your BYOD policy working? If not, here’s what can be done

Although a number of CISOs hate the phrase BYOD, the fact is many organizations have been forced to allow staff...

November 10th, 2015 Howard Solomon

Mobile Security

Creating people-centric security

By Paul Proctor and Tom Scholtz Gartner, Inc. As bring your own device (BYOD) becomes the norm in many organizations,...

June 10th, 2015 Gartner


The possible link between BYOD policies and IT budget increases

A Bring-Your-Own-Device (BYOD) policy is probably a sign an enterprise is investing in mobile collaboration and productivity, according to Enterprise...

June 9th, 2015 Gary Hilson

microchip technology

Is containerization the real answer for securing data on mobile devices?

BYOD is changing the way organizations will be managing corporate data security. In this article, we discuss how exactly mobile...

June 9th, 2015 Tamer Marzouk

Cloud Computing

A Whole New Way to Deliver IT

How to Innovate with Cloud, Analytics, Mobility and Security Location: ​P​alais des congrès de Montréal 1001 Place Jean-Paul-Riopelle Montréal, Québec...



Elevate the Branch-Office Experience with an Application-Centric Platform

Also it will show how bring-your-own-device (BYOD) computing, cloud computing, video conferencing, collaboration services and more require more visibility into...

May 4th, 2015 IT World Canada Team

Image from

Say hello to BYOW

A lot of offices probably have them by now – that fellow worker who sports a Fitbit on her wrist,...

April 30th, 2015 Nestor E. Arellano


Re-architecting your network to support BYOD

In 2012, the Gartner Group asserted that bring-your-own-device (BYOD) programs heralded the most radical shift in enterprise computing since the...

Sponsored By: HP

samsung Galaxy S6 phone

Samsung’s Galaxy S6 leads in luxury and business features

When we reviewed the Samsung Galaxy S5 last year, we thought it was a very good smartphone for business users....

April 10th, 2015 Alex Davies