Search Now

BYOD »

BYOD Success: Deciding on a reimbursement strategy

This is the final post in a series highlighting BYOD, taking a look at what concerns and procedures organizations need to evaluate as they embrace devices in the workplace. Most IT managers believe that the cost savings inherent in BYOD(assuming, again, that support costs are controlled)...

BYOD success depends on a mobile management strategy

This is the second post in a series highlighting BYOD, taking a look at what concerns and procedures organizations need to evaluate as they embrace devices in the workplace. Last time, we discussed how limiting the range of mobile device and operating system choices can improve overall IT security...

BYOD Strategy: Avoiding a BAD outcome

This is the first post in a series highlighting BYOD, taking a look at what concerns and procedures organizations need to evaluate as they embrace devices in the workplace. While Bring Your Own Device (BYOD) remains controversial in some domains, like government, healthcare, and others...

WLAN Buyer's Guide Part 2: Architectural Considerations

In order to make a viable WLAN purchase decision, knowledge of a growing list of success requirements is crucial. No longer is the WLAN just a convenience but an absolute necessity for business success in today’s fast paced world. The following will provide you with a list of...

Building unique workflows with ID Manager's APIs

Last summer we released a set of REST APIs for ID Manager. Our goal is to enable customers and partners to use these APIs to create unique, tuned workflows for their environments.  One thing you may not realize is we also used the APIs ourselves. We recently released our first iOS app, ID Manager for...

Rethink authentication to create an intelligent network

Over the course of Wi-Fi networking history, authentication has remained relatively unchanged. Most Wi-Fi networks require a password, some require username and password, and even fewer use certificate-based authentication. And don’t forget that there are still many open Wi-Fi networks out there. This...

Solving the personal BYOD and guest access challenge

We are excited about the new Aerohive iOS app. Why? Because it brings the ID Manager service to your iOS device. Now you can easily register guest and personal devices and grant temporary access to your organization’s Wi-Fi network. Secure network credentials are created instantly, for immediate...

How to enable mobility while protecting your WLAN

With the ever-increasing demand for mobility, and wireless rapidly replacing Ethernet as the primary access method onto the network, organizations are cautious of the security challenges that lie ahead. This is especially true given the demand for access from a growing number of guest and BYO-...

The Evolution of BYOD

BYOD has been around for several years and is often synonymous with MDM (mobile device management). There are many variants of BYOD, including BYOC, BYOA, etc. The common theme is the need for the company to put safeguards in place on personal devices and mitigate/eliminate risk associated with loss...

Want to get the most out of your Apple apps and devices?

If you are an educator and have not yet checked out MacStories.net, it's time.  In this week's Out of School podcast, Bradley is joined by MacStories founder, Federico Viticci, to discuss how this site - which covers all things Apple - is an excellent resource for educators. Rather than publishing...