Studie: Bring Your Own Device (BYOD) in deutschen Unternehmen

Thumb original byod wp

Wurde „Bring Your Own Device“ (BYOD) anfangs vielfach noch als Hype-Thema abgetan, so scheint es mittlerweile in der Realität und in den Unternehmen angekommen zu sein. Im Zuge der „Consumerization“ hat sich das Nutzerverhalten deutlich gewandelt und damit auch die Erwartungen der Mitarbeiter in Bezug auf das Mitbringen privater Endgeräte: So wird nicht nur eine problemlose Integration in das Unternehmensnetzwerk gefordert, sondern auch ein einfacher Zugang zu Social Media-Kanälen erwartet: Moderne (und produktive!) Mitarbeiter wollen zunehmend auch beruflich Social Media, mobile Applikationen und Cloud-Lösungen nutzen. Und ob die IT-Verantwortlichen es wollen oder nicht: sie müssen hierauf reagieren und einerseits den Angestellten (wie auch Gästen) Ressourcen zur Verfügung stellen, dürfen aber andererseits nicht die Sicherheit des Unternehmensnetzwerkes gefährden.

Doch wie ist der aktuelle Stand in Deutschlands Unternehmen? Wie haben sich die Arbeitgeber und IT-Abteilungen darauf eingestellt? Unsere Studie, die wir in der ersten Jahreshälfte 2013 durchgeführt haben, gibt hierauf Antwort. Zu den Ergebnissen nimmt Markus Nispel, Chief Technology Strategist bei Enterasys Networks, Stellung.

View whitepaper
Date: 17 October 2014, 10:12 am   |   Provider: Enterasys Networks, Inc.   |   Size: 355 KB   |   Language: English
This may interest you too:
Thumb original malwarebytes cybercrime tactics and techniques

Cybercrime tactics and techniques: Q2 2018

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, ...

To the download
Thumb original taneja report vmware cloud alternatives tco analysis april 2019 final.1.1

Taneja Report Vmware Cloud Alternatives TCO Analysis

In this paper we examine the relative costs and other advantages of four different cloud infrastructure approaches, two based on private or on-premises clouds and two on public clouds. These public and private approaches can in turn be combined to create a hybrid cloud deployment. The objective is to enable businesses to evaluate which cloud approach makes the most sense for them, based on differences in TCO and other relevant factors. ...

To the download
Thumb original idr infographic automation is essential for cyber resilience final july 2019

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Thumb original how to migrate from oracle access manager to the forgerock identity platform

How to Migrate from Oracle Access Manager to ForgeRock Identity & Access Management

Migrating from Oracle Access Manager (OAM) to ForgeRock Identity & Access Management (IAM)

Looking for an Oracle Access Manager alternative?
Legacy Web Access Management (WAM) systems like Oracle Access Management (OAM) have fundamental gaps that inhibit your business value and impede digital transformation. Fortunately, you can have a modern IAM system co-exist with the current legacy Oracle system, adding immediate value to your business, as you then plan a phased approach to migrate off of the old platform.

In this paper, we d ...

To the download
Thumb original evaluating digital identity providers for ciam

Evaluating Digital Identity Providers for Customer Identity and Access Management

Evaluation Framework for Customer Identity and Access Management
Today, six digital transformation trends are directing how you conduct business. These trends necessitate a different approach to customer identity and access management - one that is all-encompassing for any identity and built for the future.

This highly informative paper helps decision-makers navigate how to evaluate digital identity providers for customer identity and access management (CIAM) based on the six trends. This guide includes definitions and use cases for the mod ...

To the download