A really nice enterprise feature found on Windows 8 is called Windows To Go. It's a nice option for IT administrators dealing with BYOD headaches.
Here's a brief description:
Windows To Go is your own fully manageable, corporate image installed on a bootable certified USB drive. It is a new feature of Windows 8 Enterprise to help businesses address a wide range of mobility and travel light requirements.
Windows To Go is different from other mobility solutions because people can be productive from almost any location they choose to work. Simply insert a drive into a compatible computer and boot into a personalized Windows 8 image, network connectivity not required.
All of the great technologies you use with Windows 8 Enterprise work with Windows To Go: Group Policy, BitLocker, BranchCache, AppLocker, App-V, UE-V, and DirectAccess. Windows To Go is literally Windows 8 Enterprise in your pocket.
You'll need to use a Windows To Go certified drive:
Windows To Go certified drives pass a battery of certification tests, including self-hosting and boot compatibility across a variety of PCs. The certification process ensures that drives are built for the high random read / write speeds required for running Windows smoothly. Additionally, certified drives are backed with manufacturer warranties, with a focus on continuing to operate under normal working conditions. Microsoft only supports drives certified for Windows To Go.
Showing posts with label BYOD. Show all posts
Showing posts with label BYOD. Show all posts
Tuesday, February 26, 2013
Tuesday, December 11, 2012
Discussing BYOD and BYOx here at #DellWorld
Here at Dell World 2012, there was a lively discussion about BYOD, BYOx, and mobility this morning. What's the difference between BYOD vs. BYOx? Well, the "x" in BYOx represents applications, content, and other elements that go beyond the device. In other words, enterprise applications can be available on any device through robust cloud-based platforms. So, there are overlapping themes between BYOD and BYOx, but they're not the same.
We all know that we're seeing so many mobile devices entering the workplace. Mobile operating systems like iOS and Android are becoming ubiquitous in the medical workplace. I speak with physicians and medical students all the time who want to know how they can use their personal mobile device in the healthcare setting without risking security breaches around patient privacy. They're using their personal smartphones to take photos of patient rashes. They're using their iPads for remote desktop access to their office PCs running an EHR.
We all know that we're seeing so many mobile devices entering the workplace. Mobile operating systems like iOS and Android are becoming ubiquitous in the medical workplace. I speak with physicians and medical students all the time who want to know how they can use their personal mobile device in the healthcare setting without risking security breaches around patient privacy. They're using their personal smartphones to take photos of patient rashes. They're using their iPads for remote desktop access to their office PCs running an EHR.
Here are some interesting stats to consider:
- College grads today have grown up with the Internet throughout their entire lives. Generation Y, also known as the Millennial Generation, represent the mobile generation.
- Over $7 million of lost mobile phones are lost each day (the actual $ is probably actually bigger). What type of corporate data breach do these lost phones represent?
- Today's employees are accessing personal and corporate files on their own devices. What's the risk associated with this type of behavior when you mix personal and corporate cloud-based services?
It's troubling that many organizations don't have mobile device policies in place today. This is especially true when you look at small medical practices, private medical offices, and even multi-specialty medical groups. Doctors, nurses, and students are all bringing their own devices into the medical workplace. They're accessing files in the corporate cloud as well as in their personal cloud (personal content). Dell Wyse PocketCloud is an example of a personal cloud solution. The Dell Kace K3000 Mobile Management Appliance is an example of a mobile device solution that delivers robust features and capabilities. Here at Dell World, these solutions will be showcased on the exhibit floor.
Dell's approach to BYOD involves 3 key elements: 1) Define; 2) Protect; and 3) Empower while having a solid foundation that supports the evolving workforce.
Dell's approach to BYOD involves 3 key elements: 1) Define; 2) Protect; and 3) Empower while having a solid foundation that supports the evolving workforce.
Labels:
#DellWorld,
BYOD,
Dell,
mobile computing,
privacy,
security
Subscribe to:
Posts (Atom)
.jpg)