Mobile Device Backup may be Impossible

Doing a selective mobile device backup that separates work data and personal data can’t be done, says analyst Jason Buffington, but perhaps not for the reasons you think. Before I get started, let me define the two basic types of endpoint devices: consumption devices and creation devices. Consumption devices are like e-readers that fetch data … Read more

Data Protection in a BYOD World

One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets).  Frankly, most IT organizations weren’t able to do an effective job of protecting that data when the devices were corporate-owned, but with the myriad devices that are now in use, … Read more

JBuff’s BYOD Experiment (part 3 of 4) Corporate Expectations

A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD … Read more

JBuff’s BYOD Experiment (part 2 of 4) Getting Started

A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD … Read more

JBuff’s BYOD Experiment (part 1 of 4) Acquisition Challenges

One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to install agent technologies on it) — who is responsible for backing up the data, and where should corporate data be backed up to … Read more