Skip to main content

Home/ Tic&Travail/ Group items tagged BYON

Rss Feed Group items tagged

Aurialie Jublin

New security threat at work: Bring-your-own-network - Computerworld - 0 views

  •  
    BYON is a by-product of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach to security because some internal networks may now be as insecure as consumer devices. Jim Kunick, an attorney with the Chicago law firm Much Shelist, said BYON represents a more dangerous threat to data security than employees who bring their own smartphones or tablets into the office. "The network thing blows this up completely, because it takes the data out of the network the company protects," he said. "There's no way to ensure the security of that data. People are running corporate apps and processing corporate and client data using networks that may or may not be secure.
Aurialie Jublin

Midsize Insider: Think BYOD Is Bad? Get Ready For BYON - 0 views

  •  
    Après le BYOD, le BYON - Bring Your Own Network, qui va poser bcp de question de sécurité. "Do-it-yourself networking allows people to run applications in three different cloud-based environments at one time because they're on their own network, they're on a network that they contracted with, and they're on the corporate network."
Aurialie Jublin

Il serait temps de mettre la France au télétravail | Korben - 0 views

  •  
    Rien de nouveau côté arguments sur le télétravail. Je mets cet article sur notre groupe de veille pour cette phrase :  "Couplez à ça, la mouvance BYOD (Bring your own device) qui deviendrait alors SWYOD (Stay with your own device) et c'est la fête !"
Aurialie Jublin

BYOD, BYOA, PYCA, CYODE, COPE : Quel modèle choisir ? | iTPro.fr - 0 views

  •  
    "Dans la réalité, on peut distinguer un certain nombre de tendances que j'ai essayé de synthétiser dans le tableau ci-dessous. Aujourd'hui, elles sont au nombre de sept. Leur premier différentiateur concerne la propriété des objets: celle du périphérique, celle de l'application utilisée, et celle du réseau. Leur second différentiateur concerne la supervision des transactions : sera-t-elle au niveau physique ou au niveau applicatif ?"
1 - 4 of 4
Showing 20 items per page