Clicky

Moka5

  Have you ever played tug-of-war with a laptop? Although you likely haven’t found yourself holding one end of a device with someone else in your organization staring you down on the other, if you IT department and end-users in … Continued

Why should a server load be anything less than 10,000 virtualized clients? Why should restoring a failed PC take hours and not seconds? If you could reduce your endpoint capital expenditure by 78% based on implementing secure PC containers, would … Continued

There’s been a lot of chatter lately about choose your own device, also known as CYOD. Can CYOD replace BYOD? Is it a better solution for IT in terms of management and security? Will it restrict employee freedom? Is it … Continued

You’ve likely heard the speculation and the question: “Will CYOD Replace BYOD?” Unlike BYOD, which encourages end-users to work off of a personally owned device, choose-your-own-device (CYOD) addresses consumerization of the enterprise by offering employees the choice of approved devices. … Continued

There’s been a good deal of talk lately about secure containers, specifically around mobile. For instance, late last month Samsung and Good Technology announced a strategic partnership that combined Good’s secure container and Good-secured apps with Samsung KNOX hardware and … Continued

Imagine: Complete control over the desktop environment. It’s the stuff IT security dreams are made of, but even in back in the 1990s, this dream was never really a reality. After all, the IT security dream is also the stuff … Continued

BYOD programs aren’t at their most effective when IT departments implement blanket policies. In fact, doing so can cripple functionality and productivity. Fortunately, Moka5 is an expert when it comes to program execution and have significant insight into appropriate policies … Continued

  The growing influx of consumer-owned devices into the enterprise has sparked well-justified fears regarding data leaks and intellectual property security within many organizations. Although BYOD and BYOD/PC aren’t the only practices that put corporate data at risk—use of unauthorized … Continued

  BYOD isn’t going away any time soon, however Gartner estimates that within the two years, 20% of enterprise BYOD programs will fail as the result of overly restrictive mobile device management measures. Although that statistic shouldn’t stop you from … Continued

The following is a guest post from Software Advice. In an effort to understand how organizations manage their employees’ use of personal devices at work, Software Advice recently surveyed companies ranging from three to 110,000 employees. The website, which publishes reviews … Continued

The “Bring-Your-Own Device-or-PC” trend is moving full steam ahead. In fact, according to a May 2013 report by Gartner, the typical knowledge worker now uses four different devices per week to access office systems. BYOD/PC programs aren’t without risks. By … Continued

The following is a guest post submitted by Bill Callahan, a business consultant from Calgary. Few crazes have swept through the business world like that of Bring Your Own Device (BYOD). Gartner business analysts predict that by 2017, every other … Continued