Data Protection in a BYOD World

One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets).  Frankly, most IT organizations weren’t able to do an effective job of protecting that data when the devices were corporate-owned, but with the myriad devices that are now in use, … Read more

JBuff’s BYOD Experiment (part 3 of 4) Corporate Expectations

A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD … Read more

JBuff’s BYOD Experiment (part 2 of 4) Getting Started

A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD … Read more

JBuff’s BYOD Experiment (part 1 of 4) Acquisition Challenges

One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to install agent technologies on it) — who is responsible for backing up the data, and where should corporate data be backed up to … Read more

Microsoft’s Three Screens and a Cloud

Lately, it has occurred to me that Microsoft’s banter about “Three Screens and a Cloud” gets more real every day — those screens being your smartphone, your computer and your television, as a unified and unifying experience. As a confessionary disclosure: My computers run Windows, including my home server My gaming consoles are Xbox 360s … Read more