Skip to main content
Dec 10, 2012

Devise Your BYOD Strategy

Listen to advice from the experts on how to devise your BYOD Strategy.

Is Bring Your Own Device (BYOD) a trend, or just a fad?

Nick McQuire

Nicholas McQuire has over 10 years’ experience working in the enterprise mobility sector. He joined IDC in 2010 as research director for the EMEA Enterprise Mobility research program. In this role he delivers strategic analysis, presentations, consulting and insights to expertly advise industry clients on the adoption, supply, and emerging technology trends in the mobile business market.

@nickmcquire

What is the Impact of BYOD on Old World IT?

Geoffrey Moore

Geoffrey A. Moore is an author, speaker, and business advisor to high-tech enterprises and CIOs globally. He is also a venture partner at Mohr Davidow Ventures (MDV) where he counsels executive teams in the portfolio on business strategy and organizational development.

@geoffreyamoore

What are the advantages of BYOD for individuals, and for the enterprise?

Josep Valor

Josep Valor-Sabatier is professor of information systems and information technology at IESE Business School. He received his PhD in Operations Research from MIT, and his ScD in medical engineering and medical physics from the Harvard-MIT Division of Health Sciences and Technology.

@josepvalor

How do you do centralized management policy in a BYOD environment?

Aaron Freimark

Aaron Freimark is founder of EnterpriseiOS.com - the community of iOS administrators - and CTO of Tekserve, New York's largest independent Apple consultancy.

@EnterpriseiOS
Tekserve

If you want to hear more, you can sign up to access the rest of the audio conference "The Paradox of Enterprise Mobility" here.

Apperian

More from the Blog
Sep 18, 2018

The App Is The Endpoint

Traditional Endpoint Security is dead, that is to say that hardening the laptop, desktop, or device is not a panacea. ...
Read more
Aug 29, 2018

Using real-time threat analytics to thwart a serial app attacker

How Arxan helped shut down continuous reverse engineering attacks Operating in the Dark It started after releasing an app u ...
Read more
Aug 13, 2018

Don’t settle for cobbled together application protection

Truly comprehensive security should come from a single provider According to Gartner, “by 2021 more than half of enterprise ...
Read more