Don't be too restrictive with your BYOD policy
Experts warn that a BYOD policy that restricts employees too much and do not respect their privacy can have disastrous consequences on the business.
5 security tips to stay afloat in the cloud
Technology : Cloud Computing
Here are some tips for organizations to better manage and protect people, data and their devices in the cloud.
Data management set to become big: Novell
Technology : Hardware & Software
As part of its endpoint management suite, Zenworks from Novell, is not really driving up its revenues.
Will mobile computing eventually replace desktop computing?
World over, PC makers continue to see a slump in the sales of their wares, as a result most have moved or are contemplating to enter the mobile computing space.
How to optimize your IT assets without increasing costs
IT managers need to be aware of the eight disruptive technologies which have the potential to increase costs for the company.
Companies often benchmark against the wrong vendors
Category : Interviews
Kaushik Thakkar, CEO and Co-Founder at Nevales Networks discusses some of the critical issues in IT security, vendor selection and how CIOs should deal with the changing threat scenario.
Rising security threats put the spotlight on the CISO
Going forward, CISO will have a more powerful and strategic role to play in securing the enterprise.
BYOD or CYOD: Do you have a policy in place?
The speed with which BYOD is gaining ground, it is better for enterprises to take a proactive approach and formulate their policies before it gets too late.
Companies need to rethink their BYOD policies: says survey
A recent survey has proved that there are several holes in the BYOD trend and companies need to take a step back and come to conclusion on whether it works for them.
Smart wearable devices to become an enterprise reality
Some believe that smart wearable devices will trigger the Bring your own device (BYOD) trend as users will start bringing their smartwatches and glasses at the workplace.