BYOD .

58
• BYOD https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and- online-course.html

Transcript of BYOD .

Page 1: BYOD .

• BYOD

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 2: BYOD .

Mobile security - Notes

1 ^ a b BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in

2013, ABI Research

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 3: BYOD .

Novell - Products

1 ZENworks Mobile Management Secure and manage the mobile

devices your users want to work on, both corporate-issued and personal

(BYOD)

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 4: BYOD .

Mobile app - Enterprise management

1 Mobile Application management (MAM) describes software and

services responsible for provisioning and controlling access to internally

developed and commercially available Mobile Apps used in

business settings, which has become necessary with the onset of Bring

your own device (BYOD) phenomenon

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 5: BYOD .

Mac Mini

1 The Mac Mini was the first consumer level Macintosh desktop to ship without a display, keyboard, or mouse since Apple's success

following the release of the iMac, with Apple marketing it as BYODKM (Bring Your Own Display, Keyboard,

and Mouse)

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 6: BYOD .

Bring your own device

1 'Bring your own device' ('BYOD') (also called 'bring your own technology'

('BYOT'), 'bring your own phone' ('BYOP'), and 'bring your own PC' ('BYOPC')) refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to

their workplace, and to use those devices to access privileged company information and applications

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 7: BYOD .

Bring your own device

1 http://www.retailwire.com/discussion/16188/happiness-is-

bringing-your-own-computer-devices-to-work Many feel that BYOD can even be a means to attract new hires, pointing to a survey that

indicates 44% of job seekers view an organization more positively if it

supports their device

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 8: BYOD .

Bring your own device - History

1 The term BYOD was mentioned in a paper by

Ballagas et al., at UBICOMP 2005.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 9: BYOD .

Bring your own device - History

1 BYOD first entered in 2009, courtesy of Intel when it recognized an increasing tendency

among its employees to bring their own devices to work and connect them to the corporate network. However, it took until early 2011 before the term achieved any

real prominence when IT services provider Unisys and software vendors VMware and

Citrix Systems started to share their perceptions of this emergent trend.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 10: BYOD .

Bring your own device - History

1 In 2012, the U.S.A Equal Employment Opportunity Commission adopted a BYOD policy, but many employees continued to use their government-

issued BlackBerrys because of concerns about billing, and the lack

of alternative devices.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 11: BYOD .

Bring your own device - Issues

1 BYOD security relates strongly to the end node problem, wherein a device is used to

access both sensitive and risky networks/services. Because of Internet-based

risks, some very risk-averse organizations issue devices specifically for Internet use (this

is termed Inverse-BYOD).The U.S. Air Force Research Lab's (AFRL) Leader iPad Pilot did uses this method to provide its researchers

unfiltered access to the Internet, reserving its filtered, sensitive network for other use.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 12: BYOD .

Bring your own device - Issues

1 BYOD has resulted in data breaches. For example, if an employee uses a smartphone

to access the company network and then loses that phone, untrusted parties could

retrieve any unsecured data on the phone. - eSecurityPlanet.com Another type of security breach occurs when an employee leaves the company, they do not have to give back the device, so company applications and other data may still be present on their device.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 13: BYOD .

Bring your own device - Issues

1 A key issue of BYOD which is often overlooked is BYOD's phone number

problem, which raises the question of the ownership of the phone number. The issue

becomes apparent when employees in sales or other customer-facing roles leave the

company and take their phone number with them. Customers calling the number will

then potentially be calling competitors which can lead to loss of business for BYOD

enterprises.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 14: BYOD .

Bring your own device - Issues

1 A challenging but important task for companies who utilize BYOD is to

develop a policy that defines exactly what sensitive company information

needs to be protected and which employees should have access to

this information, and then to educate all employees on this policy.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 15: BYOD .

Bring your own device - Issues

1 The USMC is seeking to outsource the security requirements of their

BYOD policy to commercial carriers such as Sprint Corporation|Sprint,

Verizon, and ATT.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 16: BYOD .

Bring your own device - Advantages

1 Many industries are adopting BYOD quicker than others. A recent study by Cisco partners of BYOD practices stated that the education industry

has the highest percentage of people using BYOD for work at 95.25.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 17: BYOD .

Bring your own device - Advantages

1 Employee satisfaction, or job satisfaction, occurs with BYOD by

allowing the user to use the device they have selected as their own

rather than one selected by the IT team

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 18: BYOD .

Bring your own device - Advantages

1 A company can also see improved productivity from an employee with BYOD as it allows for the ability to easily take the device home and

work.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 19: BYOD .

Mobile application management - History

1 The “bring your own device” (BYOD) phenomenon is a factor behind

Mobile Application management, with personal PC, smartphone and tablet use in business settings (vs

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 20: BYOD .

Mobile security

1 According to ABI Research the Mobile Security Services market will total around $1.88 billion by the end of

2013.[http://www.abiresearch.com/press/byod-and-increased-malware-threats-help-driving-bi BYOD and Increased Malware Threats Help

Driving Billion Dollar Mobile Security Services Market in 2013], ABI

Researchhttps://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 21: BYOD .

Lenovo Thinkpad - ThinkPad Helix

1 The first batch of Windows 8 ultrabooks get high marks for their inspired designs, but aren’t quite flexible enough to truly be BYOD

(Bring Your Own Device) solutions

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 22: BYOD .

Ceedo

1 The Ceedo Client Family mostly addresses issues relating to management, security and

interoperability in portable computing scenarios, disaster recovery and business

continuity,Disaster Recovery datasheet: http://files.ceedo.com/resources/SO_DisasterRec

overy.pdf roaming users and work from home scenarios,Work from Home datasheet:

http://files.ceedo.com/resources/SO_WorkFromHome.pdf BYOD and general management of corporate computing assets on unmanaged

desktops.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 23: BYOD .

MetroPCS - Merger with T-Mobile USA

1 T-Mobile US plans to have the CDMA network decommissioned by the

second half of 2015 and all current customers are expected to have

been moved onto the expanded T-Mobile

networks.[http://www.phonenews.com/metropcs-to-launch-t-mobile-

powered-devices-and-byod-later-this-month-23007/ MetroPCS To Launch T-

Mobile Powered Devices And BYOD Later This Month]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 24: BYOD .

Mobile device management

1 This applies to both company-owned and employee-owned (Bring Your Own Device|BYOD) devices across the enterprise or mobile devices

owned by consumers.[ http://searchmobilecomputing.techtarget.com/sDefinition/0,290660,sid40_gci1196634,00.html What is mobile

device management? - a definition from Whatis.com][

http://www.devicemanagement.org/content/view/20754/152/ A

comprehensive article on mobile device management ]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 25: BYOD .

Mobile device management

1 Companies are alarmed at the rate of employee adoption of mobile devices

to access corporate data. MDM is now touted as a solution for

managing corporate-owned as well as personal devices in the workplace. The primary challenge is the ability to manage the risks associated with mobile access to data while securing

company issued and BYOD (Bring Your Own Device) mobile devices.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 26: BYOD .

Network Admission Control - Agent-less posture assessment

1 Most NAC vendors require the 802.1x supplicant (client or agent) to be

installed. Some, including Netclarity, Trustwave, and Enterasys [

http://www.scmagazine.com/enterasys-nac-v33/review/3273/ Enterasys

Review][https://www.trustwave.com/network-access-control/nac-

process.php Trustwave Datasheet] offer an agent-less posture checking. This is designed to handle the Bring Your Own Device or BYOD scenario

to:

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 27: BYOD .

SAP Afaria - Usage

1 Due to the increasing popularity of smartphones and other mobile

devices in the general population, many people now bring their own

devices (Mobile_application_management#The_Mobility_Invasion_and_.E2.80.98B

YOD.E2.80.99|BYOD) to work

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 28: BYOD .

Enterproid

1 'Enterproid' is an enterprise mobility management software company that

helps business customers manage employee-owned smartphones and tablets, a trend known as Bring your own device|Bring Your Own Device

(BYOD). Enterproid is best known for its dual-persona platform called Divide, which separates iOS and

Android devices into two personas for work and play.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 29: BYOD .

Enterproid - Product

1 Enterproid was one of the first companies to introduce a dual-persona approach for enterprise mobility management and BYOD

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 30: BYOD .

Enterproid - History

1 [http://www.ibtimes.com/meet-enterproid-nyc-startup-tackled-byod-

mobile-app-divides-849837 Meet Enterproid: An NYC Startup That

Tackled BYOD With A Mobile App That Divides]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 31: BYOD .

Ericom Software - Overview

1 Running entirely within a browser, AccessNow works natively with Google Chrome,

Chromebooks, Chromebox, Safari, Internet Explorer, Firefox and any other browser with

HTML5 and WebSocket support. HTML5 browsers can run on desktops, laptops, tablets,

iPad (enabling Flash to run on an iPad), and SmartPhones. This enables organizations

(companies, schools, universities, hospitals, government agencies) to allow BYOD (Bring

Your Own Device) initiatives.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 32: BYOD .

Novell Press - Products

1 *'ZENworks Mobile Management' Secure and manage the mobile

devices your users want to work on, both corporate-issued and personal

(BYOD)

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 33: BYOD .

IT as a service - Transformation to IT as a Service

1 *New consumption models leveraging self-service catalogs

offering both internal and external services; providing IT financial

transparency for costs and pricing; offering IT consumerization|

consumerized IT – such as bring your own device (BYoD) – to meet the

needs of users. All of which simplify and encourage consumption of

services.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 34: BYOD .

Infoblox - Technology

1 The company has since added DNS security products to its line, [

http://www.marketwatch.com/story/infoblox-expands-security-offerings-to-help-protect-against-dns-

security-threats-and-byod-risks-2013-06-10 Infoblox Expands Security Offerings to Help Protect Against

DNS Security Threats and BYOD Risks,” MarketWatch, June 10, 2013], retrieved 11/27/13.URL[

http://www.marketwatch.com/story/infoblox-introduces-a-new-defense-against-advanced-

persistent-threats-2013-10-30 ”Infobox Introduces a New Defense Against Advanced Persistent Threats,” MarketWatch, October 30, 2013], retrieved 11/27/13

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 35: BYOD .

Untangle - History

1 In January, 2013, Untangle released Untangle 9.4, including an all-new Captive Portal to

work with its Integrated Rules Engine (IRE), allowing for varied use cases like mobile device management for bring your own

device (BYOD) environments, integration with payment providers to support paid access for wi-fi hotspots, and separate policies for wi-fi and wired users. Other changes included an improved Session

Viewer and new Host Table view.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 36: BYOD .

BYOD - Issues

1 BYOD has resulted in data breaches.[http://www.computerweekly.com/news/2240161

202/Nearly-half-of-firms-supporting-BYOD-report-data-breaches] For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone.[http://www.esecurityplanet.com/mobile-security/4-

steps-to-securing-mobile-devices-and-apps-in-the-workplace-mdm-byod.html 4 Steps to Securing Mobile

Devices and Apps in the Workplace] - eSecurityPlanet.com Another type of security breach occurs when an employee

leaves the company, they do not have to give back the device, so company applications and other data may still

be present on their device.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 37: BYOD .

IEEE Technology Management Council - Conferences

1 * BYOD – extended infrastructure

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 38: BYOD .

Government contract - Contractor Damage

1 FAR Part 45 provides rules on the Contractor’s obligations and the Government’s remedies in these

cases. Specific clauses should be in the contract to deal with

Government-Furnished Property|Government Furnished Equipment

(GFE) situations and bring your own device (BYOD) situations.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 39: BYOD .

List of buzzwords - Science and technology

1 * BYOD|Bring your own Device - use of personal equipment (usually mobile) in a

work environment

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 40: BYOD .

Ferdinand Marcos - Post-presidency

1 Marcos was interred in a private mausoleum at Byodo-In Temple on the island of Oahu, visited daily by

the Marcos family, political allies and friends

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 41: BYOD .

Closed platform - Examples

1 * Verizon Wireless' CDMA network and policies effectively prohibiting

BYOD|activation of non-Verizon sanctioned devices on their network. Verizon Wireless is frequently noted

(and often criticized) for this practice.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 42: BYOD .

Imperial cult (ancient Rome) - Saviours and monotheists

1 Limited preview available at Google Books [http://books.google.co.uk/books?id=cOjCkfLCt3sCpg=PA79lpg=PA79dq=Philo+Gaius+Jewssource=blots=98cMQBPhKhsig=tNu1YqVtNWKbyODrrfmBYAjvtJAhl=enei=8pmESsXHGYSNjAevipmHCAsa=Xoi=book_resultct=resultresnum=1#v=onepageq=Philo%20Gaius%20Jewsf=false Books.Google.co.uk] (accessed 14 August

2009

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 43: BYOD .

Trial of Archbishop Laud - Additional charges

1 |last=ApplebyODNBweb|id=28949|

title=Weckherlin, Georg Rudolph|first=S

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 44: BYOD .

IonGrid - Product

1 Stratos is available as a free personal edition and enterprise edition.[http://www.forbes.com/sites/petercohan/2011/12/09/iong

rid-lets-ipads-go-hollywood/ Peter Cohan, Forbes, December 9, 2011: ionGrid Lets iPads Go

Hollywood][http://www.ctoedge.com/content/bringing-apple-ipad-enterprise Mike Vizard, CTOEdge, November 22, 2011: Bringing

the Apple iPad into the Enterprise][http://www.ubergizmo.com/2011/11/iongrid-nexus-enterprise/ Hubert Nguyen, Ubergizmo, November 15, 2011:

Iongrid Nexus Enterprise Cracks BYOD][http://www.dailydisruption.com/2011/12/disruptor-of-the-day-iongrid-bringing-the-ipad-to-the-enterprise-by-managing-

documents-not-the-device/ Bill Klump, Daily Disruption, December 14, 2011: Disruptor of the Day: ionGrid – Bringing The iPad To The Enterprise By Managing Documents Not The Device]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 45: BYOD .

2X Software - Profile

1 2X Mobile Device Management (2X MDM) is a solution for enterprise mobility management and mobile device management. It provides a set of tools to create a Bring Your

Own Device (BYOD) Policy and reduce the risk of Data loss

prevention software|data leakage.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 46: BYOD .

2X Software - 2X Mobile Device Management

1 2X MDM is a mobile device management platform that enables businesses to address challenges

associated with mobility such as data security, BYOD-related issues, application control and policy

distribution.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 47: BYOD .

2X Software - 2X Mobile Device Management

1 2X MDM reinforces a BYOD policy by supporting iPhones and iPads, Android and even Windows devices. BYOD is known to add administrative complications for IT management. When an

employee-owned, consumer-oriented device is used for work-related purposes, issues such as privacy, control, policy distribution, security, and data protection need to be addressed to ensure that business data are protected while not compromising the device owner's personal

data.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 48: BYOD .

Artificial insemination - General

1 His improvement of breeding efficiency by the use of antibiotics (first proven with penicillin in 1946) to control

bacterial growth, decreasing embrionic mortality and increase fertility, and various new techniques for processing, freezing and thawing of frozen semen

significantly enhanced the practical utilization of AI in the livestock industry, and earned him the

[http://books.google.com/books?id=1v2vJmdAj84Cpg=PA121lpg=PA121dq=john+o+almquistsource=blots=wd0N09r8k8sig=0WdA2pVGIqW7BMCXQDzQZjl76xUhl=enei=00XtTPLsBYOdlgfL0_CLAQsa=Xoi=book_resultct=resultresnum=7ved=0CC0Q6AEwBg# 1981 Wolf Foundation Prize in Agriculture] 1981 Wolf

Foundation Prize in Agriculture

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 49: BYOD .

Digital Textbook - Devices

1 A BYOD approach may also count out students who cannot afford a computer, e-

reader or smartphone.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 50: BYOD .

Software Defined Perimeter - Background

1 But the traditional fixed perimeter model is rapidly becoming obsolete

because of BYOD and phishing attacks providing untrusted access inside the perimeter and SaaS and

IaaS extending the perimeter into the Internet.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 51: BYOD .

Echoworx - Products

1 *mobilEncrypt - On-device email encryption for iOS, Android (operating system)|Android and Blackberry (company)|BlackBerry products.

[http://www.scmagazine.com/echoworx-mobilencrypt-endpoint/review/3679/ SC

Magazine mobilEncrypt Review] mobilEncrypt was response to a growing trend of BYOD

policies in businesses[http://www.itworldcanada.com/article/echoworx-extends-e-mail-device-encryption-to-ipad-iphone/44422 Echoworx extends e-mail

device encryption to iPad, iPhone]https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 52: BYOD .

Workspace - Mobile or Unified Workspace

1 Ever since the iPad was released by Apple in 2009, BYOD has become an increasingly more important problem for IT.http://www.zdnet.com/making-

byod-work-7000029483/ Until now, IT has purchased, provisioned, and managed all enterprise desktops which run the Microsoft Windows

software.http://www.workspot.com/wp-content/uploads/2014/02/Workspot-

Technology-White-Paper-.pdf There are nearly 500 million enterprise

desktops in the world

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 53: BYOD .

Workspace - Mobile or Unified Workspace

1 Federica Tronihttp://www.gartner.com/AnalystBiography?authorId=10906 and Mark Margeviciushttp://www.gartner.com/A

nalystBiography?authorId=13910 introduced the concept of Workspace Aggregatorhttps://www.gartner.com/d

oc/2112416/overview-workspace-aggregators to solve the problem of

BYOD. According to Gartner, a workspace aggregator unifies five

capabilities:

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 54: BYOD .

Microsoft-Novell agreement - Products

1 ** 'ZENworks Mobile Management' secures and manages mobile

devices, both corporate-issued and personal (Bring your own device|

BYOD)

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 55: BYOD .

KACE Networks - Mobile device management

1 As personal mobile devices as smart-phones and tablets are getting used in enterprise environments, including allowing them some level of access to the enterprise IT infrastructure

under the term bring your own device (BYOD), KACE anticipated a

demand to manage mobile devices in a similar way as laptops, workstations or servers.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 56: BYOD .

Genpei War - Battles

1 * 1180 Battle of Uji (1180)|First Battle of Uji - regarded as the first battle in the Genpei Wars, the monks of the

Byodoin fight alongside Minamoto no Yorimasa.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 57: BYOD .

Ahuimanu, Hawaii

1 A small commercial mall is located here across the highway from the

Valley of the Temples Memorial Park, a large cemetery noted for its Byodo-

In Temple.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html