Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

BYOD 2.0 -- Moving Beyond MDM

#BYOD has quickly transformed IT, offering a revolutionary way to support the mobile workforce. The first wave of BYOD featured MDM solutions that controlled the entire device. In the next wave, BYOD 2.0, control applies only to those apps... Read more
0 Reviews

BYOD - More Than an IT Issue

I explain the various organizational entities that should be involved when creating a BYOD policy. ps Related: F5's Feeling Alive with Newly Unveiled Mobile App Manager Inside Look - F5 Mobile App Manager Is BYO Already D? Will BYOL Cripple... Read more
0 Reviews

The Prosecution Calls Your Smartphone to the Stand

Or Bring-Your-Own-Defendant A very real legal situation is brewing is the wake of the bring your own device phenomena. #eDiscovery.  You might be familiar with some of the various legal or liability issues that should be addressed with a BYOD... Read more
0 Reviews

Mobile Threats Rise 261% in Perspective

A new report from ABI Research indicates that the number of unique mobile threats grew 261% in just two quarters.  As mobile functionality grows so does the vulnerability threat vector as mobile malware is starting to target certain... Read more
0 Reviews

Q. The Safest Mobile Device? A. Depends

Depends?!?  Well, isn't that the answer to a lot of things in this world?  Often our answer depends on the context of the question.  Sometimes the answer depends on who you ask since it may only be an opinion or a feeling. ... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 5: Trust Model

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

The Problem with Consumer Cloud Services...

…is that they're consumer #cloud services. While we're all focused heavily on the challenges of managing BYOD in the enterprise, we should not overlook or understate the impact of consumer-grade services within the enterprise. Just as... Read more
0 Reviews

BYOD and the Death of the DMZ

#BYOD #infosec It's context that counts, not corporate connections. BYOD remains a topic of interest as organizations grapple not only technologically with the trend but politically, as well. There are dire warnings that refusing to support... Read more
0 Reviews

The BYOD That is Real.

Not too long ago I wrote about VDI and BYOD, and how their hype cycles were impacting IT. In that article I was pretty dismissive of the corporate-wide democratization of IT through BYOD, and I stand by that. Internally, it is just not a realistic... Read more
0 Reviews

VMworld2012: VMware View Single Namespace

I catch up with F5 SE Scott Friedman to whiteboard and discuss F5's Single Namespace solution for VMware View.  Only 1 URL to remember and let BIG-IP make the decisions. ps Read more
0 Reviews

VMworld2012: VMware View Username Persistence

I hang with F5 Systems Engineer Joe Hermes for a cool demo showing the Username Persistence solution, which allows users to continue their VMware View session across devices. Pretty cool stuff, perfect for BYOD and an F5 exclusive. Apologies for... Read more
0 Reviews

Hype Cycles, VDI, and BYOD

Survive the hype. Get real benefits. #F5 #BYOD #VDI An interesting thing is occurring in the spaces of Virtual Desktop Infrastructure (VDI) and Bring Your Own Device (BYOD) that is subtle, and while not generally part of the technology hype cycle,... Read more
0 Reviews

Drama in the Cloud: Coming to a Security Theatre Near You

#mobile #infosec #gdi Conflicting messages from various trends are confusing … should you care about the client end-point or not? On the one hand, cloud: "Another key enabling factor for enterprise mobility is the cloud based delivery... Read more
0 Reviews

Cloud Security: It’s All About (Extreme Elastic) Control

#iam #infosec #cloud #mobile Whether controlling access by users or flows of data, control is common theme to securing “the cloud” The proliferation of mobile devices along with the adoption of hybrid cloud architectures that integrate black-box... Read more
0 Reviews

Invasion of Privacy - Mobile App Infographic Style

Couple blogs/weeks ago, I posted What’s in Your Smartphone? covering the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.   According to the study, 70% (last year) and 73% (this year)... Read more
0 Reviews

What’s in Your Smartphone?

Typical smartphone owners have an average of 41 apps per device, 9 more than they had last year according to the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.  Also last year, less than 40%... Read more
0 Reviews

BYOD–The Hottest Trend or Just the Hottest Term

It goes by many names: ‘Bring Your Own Danger’, ‘Bring Your Own Disaster’ and what most people call ‘Bring Your Own Device’ and everyone it seems is writing, talking and surveying about BYOD.  What used to be inconceivable, using your own... Read more
0 Reviews

A Digital Poltergeist On Your Television

I love starting blogs with, ‘Remember when…’ and this is no different.  Remember when, we used to receive our television programming over the air via an antenna?  Many still do but the days of seeing a huge pointy metal object perched on... Read more
0 Reviews

The New Wallet: Is it Dumb to Carry a Smartphone?

When I was a teenager, I used to have one of those cool nylon surfer wallets with the Velcro close, you remember those don’t ya?  While pumping diesel (had a VW Rabbit) one day at an old Gulf station, I left the wallet on top of the car and... Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews
0 Reviews
0 Reviews

Consolidate and Dedicate to Eradicate

Whether it be due to cloud computing, last year’s economic mess, or just the general cyclical nature of the Tech Industry, Consolidation has been a huge focus of IT departments of late.  Data Center consolidation, hardware consolidation,... Read more
0 Reviews