{"id":601,"date":"2013-04-25T13:32:04","date_gmt":"2013-04-25T13:32:04","guid":{"rendered":"http:\/\/www.write-angle.com\/thewritestuff\/?p=601"},"modified":"2013-04-25T13:32:04","modified_gmt":"2013-04-25T13:32:04","slug":"is-byod-dead","status":"publish","type":"post","link":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/","title":{"rendered":"Is BYOD dead?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div id=\"vlightbox1\"><a id=\"thumbreg\" title=\"Smart Phone With Mobile Security Button Stock Photos - Image: 29874633\" href=\"http:\/\/thumbs.dreamstime.com\/z\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\"><img loading=\"lazy\" decoding=\"async\" id=\"myimage\" title=\"Smart Phone With Mobile Security Button Stock Photos - Image: 29874633\" alt=\"Smart Phone With Mobile Security Button Stock Photos - Image: 29874633\" src=\"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\" width=\"340\" height=\"450\" \/><\/a><\/div>\n<div>\u00a9 <a itemprop=\"author\" title=\"Rvlsoft\" href=\"http:\/\/www.dreamstime.com\/rvlsoft_info\" rel=\"author\"><strong>Rvlsoft<\/strong><\/a><\/div>\n<div><\/div>\n<p>&nbsp;<\/p>\n<p><strong>It\u2019s an interesting question<\/strong> <a href=\"http:\/\/write-angle.com\">we <\/a>were asked to address in developing a recent white paper on behalf of our client <a href=\"http:\/\/appsense.com\">AppSense . <\/a><\/p>\n<p><strong> While first-generation solutions to the BYOD problem<\/strong> have focused on locking down personal and corporate-owned devices, it\u2019s become increasingly clear that IT departments have been mostly unprepared for the explosion of mobile computing and the avalanche of apps coinciding with the mobile revolution.<\/p>\n<p><strong>Recent studies estimate<\/strong> that 200 million workers are using mobile apps for business today. This strongly suggests that the consumer mobile experience has paved the way for the mobile workforce not only to expect, but demand access to data and apps from anywhere.<\/p>\n<p><strong>What does this all mean<\/strong> in the grand scheme of things? \u00a0Forward-looking organizations are moving from a lock-down approach to providing users access to apps and data they demand and require, anytime and anywhere.<\/p>\n<p><strong>AppSense<\/strong> dubs this new approach \u201cBYOX\u201d &#8211; \u00a0providing security and control anywhere they\u2019re needed, regardless of device, without adversely affecting the user experience.<\/p>\n<p><strong>Check out<\/strong> our<a href=\"http:\/\/www.write-angle.com\/wp-content\/uploads\/2011\/11\/mobilenow_byox_whitepaper.pdf\"> \u201cnine big ideas\u201d<\/a> that will be instrumental in driving the next generation of mobility management solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; \u00a9 Rvlsoft &nbsp; It\u2019s an interesting question we were asked to address in developing a recent white paper on behalf of our client AppSense . While first-generation solutions to the BYOD problem have focused on locking down personal and corporate-owned devices, it\u2019s become increasingly clear that IT departments have been mostly unprepared for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[46,154,157,107,53],"tags":[159,161,160,162,79,32,212,128],"class_list":["post-601","post","type-post","status-publish","format-standard","hentry","category-clients","category-cybercrime-as-big-business","category-it-security","category-security-clients","category-white-papers","tag-appsense","tag-byod","tag-byox","tag-mobile-apps-security","tag-peter-dave","tag-stan-devaughn","tag-white-papers","tag-write-angle-technology-writing-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is BYOD dead? - The Write Stuff<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is BYOD dead? - The Write Stuff\" \/>\n<meta property=\"og:description\" content=\"&nbsp; &nbsp; \u00a9 Rvlsoft &nbsp; It\u2019s an interesting question we were asked to address in developing a recent white paper on behalf of our client AppSense . While first-generation solutions to the BYOD problem have focused on locking down personal and corporate-owned devices, it\u2019s become increasingly clear that IT departments have been mostly unprepared for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\" \/>\n<meta property=\"og:site_name\" content=\"The Write Stuff\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-25T13:32:04+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/ae2533696fae154a2fd11d04326ef5c6\"},\"headline\":\"Is BYOD dead?\",\"datePublished\":\"2013-04-25T13:32:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\"},\"wordCount\":192,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\",\"keywords\":[\"AppSense\",\"BYOD\",\"BYOX\",\"mobile apps security\",\"Peter Dav\u00e9\",\"Stan DeVaughn\",\"white papers\",\"Write Angle technology writing services\"],\"articleSection\":[\"clients\",\"Cybercrime as big business\",\"IT security\",\"Security clients\",\"white papers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\",\"url\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\",\"name\":\"Is BYOD dead? - The Write Stuff\",\"isPartOf\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\",\"datePublished\":\"2013-04-25T13:32:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/ae2533696fae154a2fd11d04326ef5c6\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage\",\"url\":\"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\",\"contentUrl\":\"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.write-angle.com\/thewritestuff\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is BYOD dead?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/#website\",\"url\":\"https:\/\/www.write-angle.com\/thewritestuff\/\",\"name\":\"The Write Stuff\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.write-angle.com\/thewritestuff\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/ae2533696fae154a2fd11d04326ef5c6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9311d761be6d3715ca7d774e82b656216c6d5cf859a284e78829919b2c501d39?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9311d761be6d3715ca7d774e82b656216c6d5cf859a284e78829919b2c501d39?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.write-angle.com\/thewritestuff\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is BYOD dead? - The Write Stuff","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/","og_locale":"en_US","og_type":"article","og_title":"Is BYOD dead? - The Write Stuff","og_description":"&nbsp; &nbsp; \u00a9 Rvlsoft &nbsp; It\u2019s an interesting question we were asked to address in developing a recent white paper on behalf of our client AppSense . While first-generation solutions to the BYOD problem have focused on locking down personal and corporate-owned devices, it\u2019s become increasingly clear that IT departments have been mostly unprepared for [&hellip;]","og_url":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/","og_site_name":"The Write Stuff","article_published_time":"2013-04-25T13:32:04+00:00","og_image":[{"url":"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg","type":"","width":"","height":""}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#article","isPartOf":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/"},"author":{"name":"admin","@id":"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/ae2533696fae154a2fd11d04326ef5c6"},"headline":"Is BYOD dead?","datePublished":"2013-04-25T13:32:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/"},"wordCount":192,"commentCount":0,"image":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage"},"thumbnailUrl":"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg","keywords":["AppSense","BYOD","BYOX","mobile apps security","Peter Dav\u00e9","Stan DeVaughn","white papers","Write Angle technology writing services"],"articleSection":["clients","Cybercrime as big business","IT security","Security clients","white papers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/","url":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/","name":"Is BYOD dead? - The Write Stuff","isPartOf":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage"},"image":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage"},"thumbnailUrl":"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg","datePublished":"2013-04-25T13:32:04+00:00","author":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/ae2533696fae154a2fd11d04326ef5c6"},"breadcrumb":{"@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#primaryimage","url":"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg","contentUrl":"http:\/\/thumbs.dreamstime.com\/x\/smart-phone-mobile-security-button-its-screen-isolated-white-background-29874633.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.write-angle.com\/thewritestuff\/is-byod-dead\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.write-angle.com\/thewritestuff\/"},{"@type":"ListItem","position":2,"name":"Is BYOD dead?"}]},{"@type":"WebSite","@id":"https:\/\/www.write-angle.com\/thewritestuff\/#website","url":"https:\/\/www.write-angle.com\/thewritestuff\/","name":"The Write Stuff","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.write-angle.com\/thewritestuff\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/ae2533696fae154a2fd11d04326ef5c6","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.write-angle.com\/thewritestuff\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9311d761be6d3715ca7d774e82b656216c6d5cf859a284e78829919b2c501d39?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9311d761be6d3715ca7d774e82b656216c6d5cf859a284e78829919b2c501d39?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.write-angle.com\/thewritestuff\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6o3ys-9H","_links":{"self":[{"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/posts\/601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/comments?post=601"}],"version-history":[{"count":10,"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/posts\/601\/revisions"}],"predecessor-version":[{"id":611,"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/posts\/601\/revisions\/611"}],"wp:attachment":[{"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/media?parent=601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/categories?post=601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.write-angle.com\/thewritestuff\/wp-json\/wp\/v2\/tags?post=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}