BYOD Business Strategy

Great Essays
I split it up the way it is now just so you could read it better and also because he wanted subsections. Never written a paper with those so no clue what he wanted haha but I assumed it would be easier for you to fix it with it split up more anyway. ALSO I CITED IN MLA…I HAVE THE CITATIONS…NOT SURE WHICH ONE ENDNOTE USES?

LASTLY….I cited statistics from a summary article because the original you had to pay for. Do you think he’s going to care? I can site the original…just didn’t know if you thought you needed to?

TITLE With the new innovations technology has brought to the business world, the model “bring your own device,” or BYOD, is becoming a popular strategy for many organization to continue to keep up with new trends as well as keep customers and employees happy. Today, this model is quickly becoming one of the main drives behind most enterprise mobility investment decisions. While this strategy can be financially rewarding, as well as positively impact the employees and productivity of an organization, the journey to make this practice widespread is
…show more content…
A survey by Accession and the Information Security Media Group found that “72% of organizations rate their mobile security as “poor,” “needs improvement,” or “adequate.” Only 5% of organizations judge their mobile security to be “excellent.” (Accelion- needs to be cited but need to know where that PDF is from to do so). Attempting to protect the company and the customers on multiple devices is a challenge. The company has to be able to manage the security for each drive, application, and any customer-oriented services. Due to the rapid evolution of consumer mobility and the changing face of the main producers in application and computer development, simply trying to manage all of the devices that are in circulation currently with regards to security is a

Related Documents

  • Improved Essays

    Use of non-work related applications like P2P and Internet gaming has been stopped. A wide range of malware and application vulnerability exploits are being blocked. Operational costs have been reduced dramatically. Ease of Use and Application Controls Help Carling Technologies ‘Stick it’ to Network Security Threats BACKGROUND Carling Technologies Inc., founded in 1920 and home of the Carlingswitch brand, has a diverse line of products that serve a multitude of markets. Many of these products have become recognized standards around the globe.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Since much of our outside sales team worked using SaaS software using iPads, I also became the subject matter expert on mobility management using VMWare Airwatch. In 2015, much of my work was on a small research project, managing between two and three hundred Android tablets. The most valuable thing that my time at Ochsner exposed me to were the ideas and methodologies for standardizing and automating security across a massive, multi-site enterprise (around 30,000 endpoints). During my time there I also participated in LANDesk training, where I learned how Ochsner provisions and deploys to their endpoints.…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Content: The content of this essay does an excellent job in supporting your claims about Wilson’s drama fences. Although your essay is a couple pages shy of the minimum essay length, what you have so far is a promising start to your essay draft. The only cause for concern I have for your draft is your last paragraph since it is incomplete, however I’m confident that you're in the process of completing your essay draft. Organization: The organization of this essay is currently on the right track, since both body paragraphs align with the thesis of the essay. Since your essay is not fully complete make sure that your new body paragraphs are in support of the thesis statement and do not go off topic.…

    • 339 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Mobile technology has advanced at an alarming rate over just the past decade alone. In the museum world it has also had numerous technological advances, some examples being audio tours, online catalogs, and phone apps. The main concern with technology now is if it's aiding or hurting the user. The case study Victoria López Benito conducted supports the view point of technology allowing individuals to further their knowledge. The use of mobile apps have the ability to distract viewers and take away from the exhibits.…

    • 983 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    ABC Company's Workgroup to Domain Transition James M. Ghastin ISSC340 Local Area Network Technologies American Military University Abstract The ABC company has been doing extremely well in the app development market. Consumers are downloading the most recent game developed for Android phones at an extremely fast pace. With the success of both this year's game and last year's game, ABC company has had to hire new employees and expand.…

    • 1339 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Through the three parts of the Monsanto project, (the process, the paper, and the presentation), I’ve gained new writing skills and insight from my partners I will use in further writing such as the upcoming transnational corporation assignment. The overall researching and writing process as a group was simple because my group was easy to work with and each individual contributed in researching, writing, and presenting. Researching was fairly straightforward and did not require much digging around because there is a ton of information about Monsanto, Monsanto history, lawsuits, and the food industry in general online. We split up our research so that everyone looked up a different portion of our focus of intellectual property (IP).…

    • 702 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Myths About BYOD

    • 521 Words
    • 3 Pages

    Two Myths about BYOD and Cloud Security “A half truth is much worse than a whole lie because it makes it even harder to tell the difference between the two.” That’s according to philosopher and psychologist Gene Rulye. And he’s right … not only in life, but especially when it comes to security.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    BYOD Policy

    • 609 Words
    • 3 Pages

    INTRODUCTION Change has been a constant matter in technology. With technology’s interminably redefinition, its remarkable impact in the population has been apparent extensively. Indeed, technology has significantly changed the way humans live. It changed the way they perceive various circumstances and the way they interact with one another. To a certain extent, it has become a concept that people won’t survive without.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    “Effectively, we’ve treated the average wage premium as if it were a guarantee and then we’ve encouraged college students to borrow against it” (2012).” I wanted to directly quote this information from the article to use it on my assignment to help me explain something. I decided to fix this because it wasn’t in correct APA format. I had to add the in-text citation because I did not have it before, so I had to add it. The article did not have any pages, so I didn’t add it.…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Conglomerate Inc. has teamed up with a PC manufacturer to create, produce and market a product that combines a Personal Digital Assistant (PCA) with a “smart” mobile phone. This new and innovative device will be called ConneCtor. This report utilizes an excel software to run an analysis on the date collected and group the findings into appropriate clusters. From there, a specific cluster is identified as the ‘target’ cluster for the company to market the ConneCtor to.…

    • 1212 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Vault Aviation is an up and coming business out of Dallas that connects individuals who want private charter flights with operators who can provide those flights. Vault Aviation could be called a broker of sorts, as it buys the flights for wholesale and sells the flights to its customers at a markup for a retail price. The company has 42 employees, including the founders, who serve as the CEO and president of the company respectively. The company is based on one office floor. All of the people who work for the company have a company computer as well as a tablet to provide them with the opportunity to connect with clients.…

    • 1570 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    When users think about a divorce from their Apple or Android devices, the idea of exclusivity vs. variety comes to mind. Each company offers different models at different price points, but with Android variety is their key selling point. There are over eighty Android models to choose from within all the major carriers. This is a way to ensure that there is a clear cut option that satifiys a user’s lifestyle and meets their mobile needs precisely. On the contrary, Apple only offers six basic models that are currently…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The smartphone has completely revolutionized how we do business, with both positive and negative consequences thrown in the mix. Compared to our prior methods of communicating, it is the limited unlimited. It is capable of so much, and yet not capable of everything. This particular form of technology has positively impacted the business world as a whole, because smartphones have improved: the speed of communication, the distance workers can be from the office, combined other methods of communication, changed the shopping habits of consumers, made a new market, and changed who is able to conduct modern business. Without the smartphone, we wouldn’t be able to…

    • 1125 Words
    • 5 Pages
    Superior Essays