SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
To BYOD or
not to BYOD
How will it affect your business
and your people?
Sources: Cisco Systems, Forrester, Aberdeen, Dell Quest, ICP Networks, Harris, Juniper Networks Malicious Mobile Threats Report May 2011
By 2015 there will be almost
15 billion
network-connected devices
By 2016
350,000,000
people
will use their smartphones for work
In 2013, 52% of IT professionals in
the UK see BYOD as positive.
Compared with 88% in China.
88%
52%
IT departments are keen
to embrace the trend
There are challenges
1in 20
mobile devices
were stolen
in 2010
29%
distribute
unauthorised
data
31%
Who use a
laptop for work
will connect to
the company’s
network via a
free or public
Wi-Fi
connection
46%
who use a
personal
device for
work have let
someone else
use it
81%
Use a personal
electronic
device for
work-related
functions
Get you and your
business safe and
ready for BYOD
Call +44 (0)1793 417755
Visit http://enterprise.bcs.org
• Professional certification
• Career mapping
• Skills benchmarking
• Professional development

Más contenido relacionado

La actualidad más candente

2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities CompTIA
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?GENIANS, INC.
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTSemyon Teplisky
 
D link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessD link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessGerald Schouten
 
5 technology that will redefine a post covid 19 aleena
5 technology that will redefine a post covid 19 aleena5 technology that will redefine a post covid 19 aleena
5 technology that will redefine a post covid 19 aleenaAleena2020
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3sapenov
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsJustin Grammens
 
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesInternet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesSarra REBHI
 
Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)Sujit Soman
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Dr. Mazlan Abbas
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Wheatstone
 
Minedshare 10 21 08
Minedshare 10 21 08Minedshare 10 21 08
Minedshare 10 21 08Keith Gerr
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challengesAnastasios Economides
 
State of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreState of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreErol Dizdar
 
Mobile Web
Mobile WebMobile Web
Mobile Webnkdas75
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationMark Goldstein
 

La actualidad más candente (20)

2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
D link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessD link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wireless
 
5 technology that will redefine a post covid 19 aleena
5 technology that will redefine a post covid 19 aleena5 technology that will redefine a post covid 19 aleena
5 technology that will redefine a post covid 19 aleena
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
 
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance ChallengesInternet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
 
Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)Embracing the ioe to capture your share of $14.4trillion (1)
Embracing the ioe to capture your share of $14.4trillion (1)
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
Minedshare 10 21 08
Minedshare 10 21 08Minedshare 10 21 08
Minedshare 10 21 08
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
IOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in TaiwanIOT Trend and Solution Development in Taiwan
IOT Trend and Solution Development in Taiwan
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
State of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreState of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is core
 
Mobile Web
Mobile WebMobile Web
Mobile Web
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
 

Destacado

Technology integration
Technology integrationTechnology integration
Technology integrationbriggsad
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”Mark Mad
 
Всеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАВсеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАmariya776
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
La vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaLa vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaKracopayner
 
Sql injection
Sql injectionSql injection
Sql injectionBee_Ware
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioOlli Kärkkäinen
 
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงานใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงานMark Mad
 
Infographic: Dementia Toolkit
Infographic: Dementia ToolkitInfographic: Dementia Toolkit
Infographic: Dementia ToolkitTracy Steel
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationBee_Ware
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre inforlissalejandra
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistryAsmaa Mohammed
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising AttacksBee_Ware
 

Destacado (20)

morphometric analysis
morphometric analysismorphometric analysis
morphometric analysis
 
Intro
IntroIntro
Intro
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
ใบงานที่ 7 เรื่อง โครงงานประเภท “การประยุกต์ใช้งาน”
 
Всеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРАВсеукраїнський Рух ЗАВТРА
Всеукраїнський Рух ЗАВТРА
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
La vida al voltant de la mediterrànea
La vida al voltant de la mediterràneaLa vida al voltant de la mediterrànea
La vida al voltant de la mediterrànea
 
Erreportajea dna
Erreportajea dnaErreportajea dna
Erreportajea dna
 
Sql injection
Sql injectionSql injection
Sql injection
 
Vocales ruddy
Vocales ruddyVocales ruddy
Vocales ruddy
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvio
 
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
 
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงานใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
ใบงานที่ 2 เรื่อง ความหมายและความสำคัญของโครงงาน
 
Infographic: Dementia Toolkit
Infographic: Dementia ToolkitInfographic: Dementia Toolkit
Infographic: Dementia Toolkit
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authentication
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre infor
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistry
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 

Similar a To byod or not to byod

Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...Katy Slemon
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must KnowVala Afshar
 
Infographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem AdvantageInfographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem AdvantageAppDirect
 
When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do? When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do? MadgeTech Inc
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must KnowExtreme Networks
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxSameerShaik43
 
Internet of Things - The new Paradigmn
Internet of Things - The new ParadigmnInternet of Things - The new Paradigmn
Internet of Things - The new ParadigmnDeepu S Nath
 
IS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomIS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomWilliam H. Miller, Jr.
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 
Technology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesTechnology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesSoftware Park Thailand
 
The Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoTThe Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoTwaylay
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationJay McBain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
 

Similar a To byod or not to byod (20)

BYOD
BYODBYOD
BYOD
 
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
Top 08 IoT Trends to Watch Out in 2020 (Top IoT Trends + Digital Transformati...
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 
Infographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem AdvantageInfographic: The Internet of Things and the Ecosystem Advantage
Infographic: The Internet of Things and the Ecosystem Advantage
 
When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do? When You Wake Up, What is The First Thing You Do?
When You Wake Up, What is The First Thing You Do?
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
Internet of Things - The new Paradigmn
Internet of Things - The new ParadigmnInternet of Things - The new Paradigmn
Internet of Things - The new Paradigmn
 
IS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_BroadcomIS_Associates_IoT_Pres_Miller_Broadcom
IS_Associates_IoT_Pres_Miller_Broadcom
 
Trends in IT
Trends in ITTrends in IT
Trends in IT
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Meet&Greet #3 - IoT Vietnam
Meet&Greet #3 - IoT VietnamMeet&Greet #3 - IoT Vietnam
Meet&Greet #3 - IoT Vietnam
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
Technology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai IndustriesTechnology Trends : Impacts to Thai Industries
Technology Trends : Impacts to Thai Industries
 
The Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoTThe Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoT
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 

Más de Bee_Ware

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnellesBee_Ware
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape reportBee_Ware
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudBee_Ware
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Bee_Ware
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBee_Ware
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Bee_Ware
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsBee_Ware
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Bee_Ware
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to goBee_Ware
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesBee_Ware
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéBee_Ware
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsBee_Ware
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Bee_Ware
 

Más de Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 

Último

Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna SpA
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Philip Rabenok
 
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your AreaGorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Areameghakumariji156
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024Kweku Zurek
 
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证xzxvi5zp
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样sovco
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation
 
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Klinik kandungan
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationLeonardo
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationPaul West-Sells
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Ltd
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024gstubel
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024KDDI
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfProbe Gold
 

Último (20)

SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
 
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 ResultsOsisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 Results
 
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your AreaGorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
Gorakhpur Call Girls 8250092165 Low Price Escorts Service in Your Area
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
 
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
一比一原版(Acadia毕业证书)加拿大阿卡迪亚大学毕业证学历认证可查认证
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings Results
 
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
Jual obat aborsi Tawangmangu ( 085657271886 ) Cytote pil telat bulan penggugu...
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdfITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 Presentation
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings Presentation
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
 

To byod or not to byod

  • 1. To BYOD or not to BYOD How will it affect your business and your people? Sources: Cisco Systems, Forrester, Aberdeen, Dell Quest, ICP Networks, Harris, Juniper Networks Malicious Mobile Threats Report May 2011
  • 2. By 2015 there will be almost 15 billion network-connected devices
  • 3. By 2016 350,000,000 people will use their smartphones for work
  • 4. In 2013, 52% of IT professionals in the UK see BYOD as positive. Compared with 88% in China. 88% 52%
  • 5. IT departments are keen to embrace the trend
  • 6. There are challenges 1in 20 mobile devices were stolen in 2010 29% distribute unauthorised data 31% Who use a laptop for work will connect to the company’s network via a free or public Wi-Fi connection 46% who use a personal device for work have let someone else use it 81% Use a personal electronic device for work-related functions
  • 7. Get you and your business safe and ready for BYOD Call +44 (0)1793 417755 Visit http://enterprise.bcs.org • Professional certification • Career mapping • Skills benchmarking • Professional development