Tagged - consumerization

BYOD Acceptable Use Policy

The purpose of the BYOD Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally owned device to a company’s...

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document that...

Mobile Device Reimbursement Policy

The mobile device reimbursement policy will outline the devices and voice/data plans that qualify for corporate reimbursement and the limits of corporate reimbursement of...

Consumer Technology SWOT Analysis and Tech Monitor Tool

Advancements in consumer technology can catch you off guard if you are not properly prepared. Evaluate emerging consumer technologies annually, and start managing consumer...

Case Study: HHS

The influx of consumer devices has brought along a variety of potential security risks through the consumer applications that end users have on their devices. Hamilton...

Integrate Consumer Applications

This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance hospital IT security compliance.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us