BYOD: How and why?

Summary:How exactly should businesses approach the phenomenon of BYOD?

As the popularity of the bring-your-own-device (BYOD) model grows, and the desire for people to use their own mobile devices for work purposes increases, corporate networks are going to be accessed by a greater variety of devices. How can IT managers deal with this increasing headache?

ZDNet Australia held a 1-hour webinar on October 10, 2012 with Twisted Wire podcast host Phil Dobbie to help you get to grips with the BYOD issue. He was assisted by Michael Greco, Juniper's APAC director of security.

The webinar covered:

  • Mobility: The corporate risks

  • The dangers of people using their own mobile devices

  • Ignoring BYOD at your peril

  • The growth of BYOD and the downsides of a policy that ignores peoples' desires to use their own devices

  • How you need to protect, connect, and manage devices. Greco took us through the four steps needed to enable your network for BYOD use.

Topics: Telcos

About

Suzanne Tindal heads up a team of keen ZDNetters, including journalists Luke Hopewell, Josh Taylor and Michael Lee. You can follow them all on Twitter: @engochick, @joshgnosis, @lukehopewell, @mukimu. Happy listening!

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.