• Exciting times are ahead for Technicolor and its incredible branches! The future looks bright for studios like Mikros Animation, MPC, and The Mill. Each day brings us closer to innovative collaborations and groundbreaking projects!

    In France, the possibilities are bubbling with discussions of joint offerings that can enhance creativity and spark imagination. The landscape may vary by country, but the shared passion for artistry and excellence unites us all. Let's stay tuned for these developments and support one another in this vibrant journey!

    Keep dreaming big, everyone! The best is yet to come!

    #Technicolor #MikrosAnimation #MPC #TheMill #FutureOfAnimation
    Exciting times are ahead for Technicolor and its incredible branches! 🌈✨ The future looks bright for studios like Mikros Animation, MPC, and The Mill. Each day brings us closer to innovative collaborations and groundbreaking projects! 🎉 In France, the possibilities are bubbling with discussions of joint offerings that can enhance creativity and spark imagination. 💡💖 The landscape may vary by country, but the shared passion for artistry and excellence unites us all. Let's stay tuned for these developments and support one another in this vibrant journey! 🚀 Keep dreaming big, everyone! The best is yet to come! 🌟 #Technicolor #MikrosAnimation #MPC #TheMill #FutureOfAnimation
    Technicolor (Mikros, MPC, The Mill) : nos dernières informations
    L’avenir des différentes branches du groupe Technicolor se dessine peu à peu. Voici les dernières informations dont nous disposons sur le futur des studios Mikros Animation, MPC et The Mill. Comme vous le verrez, selon le pays, la situation var
    1 Комментарии 0 Поделились 0 предпросмотр
  • MPC, The Mill, TransPerfect, effets visuels, Technicolor, industrie du cinéma, publicité, animation, studios de création

    ## Une fin amère pour des géants créatifs

    Dans un monde où la magie du cinéma et de la publicité se tisse à travers des effets visuels éblouissants, la triste nouvelle du rachat de MPC et The Mill par TransPerfect résonne comme un écho douloureux. Ces deux studios, réputés pour leur créativité et leur expertise, se voient aujourd'hui aux prises avec une réalité amère. On les...
    MPC, The Mill, TransPerfect, effets visuels, Technicolor, industrie du cinéma, publicité, animation, studios de création ## Une fin amère pour des géants créatifs Dans un monde où la magie du cinéma et de la publicité se tisse à travers des effets visuels éblouissants, la triste nouvelle du rachat de MPC et The Mill par TransPerfect résonne comme un écho douloureux. Ces deux studios, réputés pour leur créativité et leur expertise, se voient aujourd'hui aux prises avec une réalité amère. On les...
    TransPerfect met la main sur MPC et The Mill en France
    MPC, The Mill, TransPerfect, effets visuels, Technicolor, industrie du cinéma, publicité, animation, studios de création ## Une fin amère pour des géants créatifs Dans un monde où la magie du cinéma et de la publicité se tisse à travers des effets visuels éblouissants, la triste nouvelle du rachat de MPC et The Mill par TransPerfect résonne comme un écho douloureux. Ces deux studios, réputés...
    Like
    Love
    Wow
    Sad
    Angry
    158
    1 Комментарии 0 Поделились 0 предпросмотр
  • Dorothy Ballarini, character and creature artist, 3D modeling, Brazilian artist, Jurassic World, La Petite Sirène, Blanche-Neige, DNEG, Cinesite, MPC, Framestore

    ---

    In the shadows of the vibrant Brazilian landscape, where dreams intertwine with the pain of reality, a quiet artist breathes life into the depths of imagination. Dorothy Ballarini, a name that resonates with both magic and sorrow, is a master of character and creature design, conjuring beings that are at once beautiful and hauntin...
    Dorothy Ballarini, character and creature artist, 3D modeling, Brazilian artist, Jurassic World, La Petite Sirène, Blanche-Neige, DNEG, Cinesite, MPC, Framestore --- In the shadows of the vibrant Brazilian landscape, where dreams intertwine with the pain of reality, a quiet artist breathes life into the depths of imagination. Dorothy Ballarini, a name that resonates with both magic and sorrow, is a master of character and creature design, conjuring beings that are at once beautiful and hauntin...
    **The Heartbreak of Creation: Dorothy Ballarini and the Art of Characters and Creatures**
    Dorothy Ballarini, character and creature artist, 3D modeling, Brazilian artist, Jurassic World, La Petite Sirène, Blanche-Neige, DNEG, Cinesite, MPC, Framestore --- In the shadows of the vibrant Brazilian landscape, where dreams intertwine with the pain of reality, a quiet artist breathes life into the depths of imagination. Dorothy Ballarini, a name that resonates with both magic and...
    Like
    Love
    Wow
    Sad
    Angry
    138
    1 Комментарии 0 Поделились 0 предпросмотр
  • In a world where the line between reality and digital wizardry is blurrier than ever, the recent revelations from the VFX wizards of "Emilia Pérez" are nothing short of a masterclass in illusion. Who knew that behind the glitzy allure of cinema, the real challenge lies not in crafting captivating stories but in wrestling with software like Meshroom, which sounds more like a trendy café than a tool for tracking and matchmoving?

    Cédric Fayolle and Rodolphe Zirah, the dynamic duo of visual effects from Les Artizans and MPC Paris, have bravely ventured into the trenches of studio filming, armed with little more than their laptops and a dream. As they regale us with tales of their epic battles against rogue pixels and the occasional uncooperative lighting, one can't help but wonder if their job descriptions should include "mastery of digital sorcery" along with their technical skills.

    The irony of creating breathtaking visuals while juggling the whims of digital tools is not lost on us. It's like watching a magician pull a rabbit out of a hat, only the hat is a complex software that sometimes works and sometimes… well, let's just say it has a mind of its own. Honestly, who needs a plot when you have VFX that can make even the dullest scene sparkle like it was shot on a Hollywood red carpet?

    As they delve into the challenges of filming in a controlled environment, the question arises: are we really impressed by the visuals, or are we just in awe of the technology that makes it all possible? Perhaps the true stars of "Emilia Pérez" aren’t the actors or the storyline, but rather the invisible hands of the VFX teams. And let’s face it, if the storyline fails to captivate us, at least we'll have some eye-popping effects to distract us from the plot holes.

    So, as we eagerly await the final product, let’s raise a glass to Cédric and Rodolphe, the unsung heroes of the film industry, tirelessly working behind the curtain to ensure that our cinematic dreams are just a few clicks away. After all, who wouldn’t want to be part of a film where the biggest challenge is making sure the virtual sky doesn’t look like a poorly rendered video game from the '90s?

    In the grand scheme of the film industry, one thing is clear: with great VFX comes great responsibility—mainly the responsibility to keep the audience blissfully unaware of how much CGI magic it takes to make a mediocre script look like a masterpiece. Cheers to that!

    #EmiliaPérez #VFX #FilmMagic #DigitalSorcery #Cinema
    In a world where the line between reality and digital wizardry is blurrier than ever, the recent revelations from the VFX wizards of "Emilia Pérez" are nothing short of a masterclass in illusion. Who knew that behind the glitzy allure of cinema, the real challenge lies not in crafting captivating stories but in wrestling with software like Meshroom, which sounds more like a trendy café than a tool for tracking and matchmoving? Cédric Fayolle and Rodolphe Zirah, the dynamic duo of visual effects from Les Artizans and MPC Paris, have bravely ventured into the trenches of studio filming, armed with little more than their laptops and a dream. As they regale us with tales of their epic battles against rogue pixels and the occasional uncooperative lighting, one can't help but wonder if their job descriptions should include "mastery of digital sorcery" along with their technical skills. The irony of creating breathtaking visuals while juggling the whims of digital tools is not lost on us. It's like watching a magician pull a rabbit out of a hat, only the hat is a complex software that sometimes works and sometimes… well, let's just say it has a mind of its own. Honestly, who needs a plot when you have VFX that can make even the dullest scene sparkle like it was shot on a Hollywood red carpet? As they delve into the challenges of filming in a controlled environment, the question arises: are we really impressed by the visuals, or are we just in awe of the technology that makes it all possible? Perhaps the true stars of "Emilia Pérez" aren’t the actors or the storyline, but rather the invisible hands of the VFX teams. And let’s face it, if the storyline fails to captivate us, at least we'll have some eye-popping effects to distract us from the plot holes. So, as we eagerly await the final product, let’s raise a glass to Cédric and Rodolphe, the unsung heroes of the film industry, tirelessly working behind the curtain to ensure that our cinematic dreams are just a few clicks away. After all, who wouldn’t want to be part of a film where the biggest challenge is making sure the virtual sky doesn’t look like a poorly rendered video game from the '90s? In the grand scheme of the film industry, one thing is clear: with great VFX comes great responsibility—mainly the responsibility to keep the audience blissfully unaware of how much CGI magic it takes to make a mediocre script look like a masterpiece. Cheers to that! #EmiliaPérez #VFX #FilmMagic #DigitalSorcery #Cinema
    Emilia Pérez : Les Artizans et MPC nous dévoilent les secrets des VFX !
    Nous vous proposons un retour en vidéo sur les effets visuels du film Emilia Pérez de Jacques Audiard, avec Cédric Fayolle (Superviseur VFX Général, Les Artizans) et Rodolphe Zirah (Superviseur VFX, MPC Paris). Le duo revient sur les défis d’un
    Like
    Love
    Wow
    Sad
    Angry
    519
    1 Комментарии 0 Поделились 0 предпросмотр
  • FX Drops ‘Alien: Earth’ Official Trailer, Key Art

    If we don’t lock them down, it will be too late. The official trailer and key art have been revealed for Alien: Earth, which hits FX and Hulu August 12.
    In the upcoming series, when the mysterious deep space research vessel USCSS Maginot crash-lands on Earth, Wendy and a ragtag group of tactical soldiers make a fateful discovery that puts them face-to-face with the planet’s greatest threat.
    The series stars Sydney Chandler as Wendy; Timothy Olyphant as Kirsh; Alex Lawther as Hermit; Samuel Blenkin as Boy Kavalier; Babou Ceesay as Morrow;  Adrian Edmondson as Atom Eins; David Rysdahl as Arthur Sylvia; Essie Davis as Dame Sylvia; Lily Newmark as Nibs; Erana James as Curly; Adarsh Gourav as Slightly; Jonathan Ajayi as Smee; Kit Young as Tootles; Diêm Camille as Siberian; Moe Bar-El as Rashidi; and Sandra Yi Sencindiver as Yutani.
    Noah Hawley is creator and executive producer. Ridley Scott, David W. Zucker, Joseph Iberti, Dana Gonzales, and Clayton Krueger also executive produce. FX Productions produces.
    VFX are created by Clear Angle Studios, Fin Design & Effects, MPC, Pixomondo, The Third Floor, Untold Studios, and Zoic Studios, with Jonathan Rothbart acting as visual effects supervisor.
    Check out the official trailer now:

    Source: FX

    Journalist, antique shop owner, aspiring gemologist—L'Wren brings a diverse perspective to animation, where every frame reflects her varied passions.
    #drops #alien #earth #official #trailer
    FX Drops ‘Alien: Earth’ Official Trailer, Key Art
    If we don’t lock them down, it will be too late. The official trailer and key art have been revealed for Alien: Earth, which hits FX and Hulu August 12. In the upcoming series, when the mysterious deep space research vessel USCSS Maginot crash-lands on Earth, Wendy and a ragtag group of tactical soldiers make a fateful discovery that puts them face-to-face with the planet’s greatest threat. The series stars Sydney Chandler as Wendy; Timothy Olyphant as Kirsh; Alex Lawther as Hermit; Samuel Blenkin as Boy Kavalier; Babou Ceesay as Morrow;  Adrian Edmondson as Atom Eins; David Rysdahl as Arthur Sylvia; Essie Davis as Dame Sylvia; Lily Newmark as Nibs; Erana James as Curly; Adarsh Gourav as Slightly; Jonathan Ajayi as Smee; Kit Young as Tootles; Diêm Camille as Siberian; Moe Bar-El as Rashidi; and Sandra Yi Sencindiver as Yutani. Noah Hawley is creator and executive producer. Ridley Scott, David W. Zucker, Joseph Iberti, Dana Gonzales, and Clayton Krueger also executive produce. FX Productions produces. VFX are created by Clear Angle Studios, Fin Design & Effects, MPC, Pixomondo, The Third Floor, Untold Studios, and Zoic Studios, with Jonathan Rothbart acting as visual effects supervisor. Check out the official trailer now: Source: FX Journalist, antique shop owner, aspiring gemologist—L'Wren brings a diverse perspective to animation, where every frame reflects her varied passions. #drops #alien #earth #official #trailer
    WWW.AWN.COM
    FX Drops ‘Alien: Earth’ Official Trailer, Key Art
    If we don’t lock them down, it will be too late. The official trailer and key art have been revealed for Alien: Earth, which hits FX and Hulu August 12. In the upcoming series, when the mysterious deep space research vessel USCSS Maginot crash-lands on Earth, Wendy and a ragtag group of tactical soldiers make a fateful discovery that puts them face-to-face with the planet’s greatest threat. The series stars Sydney Chandler as Wendy; Timothy Olyphant as Kirsh; Alex Lawther as Hermit; Samuel Blenkin as Boy Kavalier; Babou Ceesay as Morrow;  Adrian Edmondson as Atom Eins; David Rysdahl as Arthur Sylvia; Essie Davis as Dame Sylvia; Lily Newmark as Nibs; Erana James as Curly; Adarsh Gourav as Slightly; Jonathan Ajayi as Smee; Kit Young as Tootles; Diêm Camille as Siberian; Moe Bar-El as Rashidi; and Sandra Yi Sencindiver as Yutani. Noah Hawley is creator and executive producer. Ridley Scott, David W. Zucker, Joseph Iberti, Dana Gonzales, and Clayton Krueger also executive produce. FX Productions produces. VFX are created by Clear Angle Studios, Fin Design & Effects, MPC, Pixomondo, The Third Floor, Untold Studios, and Zoic Studios, with Jonathan Rothbart acting as visual effects supervisor. Check out the official trailer now: Source: FX Journalist, antique shop owner, aspiring gemologist—L'Wren brings a diverse perspective to animation, where every frame reflects her varied passions.
    0 Комментарии 0 Поделились 0 предпросмотр
  • Purposeful Design: C&CPF's Bold New Visual Identity

    06/03 — 2025

    by abduzeedo

    Explore the impactful branding and visual identity for Culture & Community Power Fund by Outside. See how design elevates community action.
    Hey creatives! Let's dive into some truly inspiring work today. Our friends at Outside, a global design and tech studio based in Kathmandu, recently rolled out a fresh brand and website for the Culture & Community Power Fund. This project isn't just about aesthetics; it's about design with a deeper purpose.
    Crafting a Visual Voice for Community Power
    C&CPF champions grassroots organizations. They focus on communities most affected by systemic oppression. Their mission involves direct funding, sharing resources, and building networks. Outside's goal was clear: uplift grantee work, create a wisdom hub, and clarify culture's role in social action .
    Elizabeth Lepro, Editorial Lead at Outside, shared that the project expanded their understanding of "culture." They aimed to visually inject the celebratory and communal aspects of shared spaces, rituals, stories, and traditions throughout the brand . This passion shines through in the final output.
    The Ampersand: A Symbol of Collaboration
    One standout element in C&CPF's new branding and visual identity is the ampersand. Outside emphasized this symbol in the logo, a direct nod to C&CPF's collaborative ethos.
    What's really clever is how they rendered the ampersand in various fonts. Each typeface reflects the diverse visions of C&CPF's partner-grantees. For instance, the rounded Akaya Kanadaka typeface conveys the joyful spirit of culturally infused community power building. Pilowlava, another typeface, speaks to a grantee-partner's work in urban farming and sustainability . It's a subtle yet powerful way to represent unity in diversity.
    Gritty, Bold, and Inviting Visuals
    Established in 2022, C&CPF is relatively new. They wanted to avoid looking overly traditional. Outside delivered a gritty, bold aesthetic, drawing inspiration from protest signs and zines. Snappy animations complement this vibe. They even provided image frames to unify varying aesthetics from featured organizations.
    The chosen color palette is a rich blend of orange, purple, yellow, black, and white. This combination expresses warmth and invitation, perfectly aligning with the Fund's focus on people and communities. The brand incorporates vibrant photography, showcasing scenes like festivals, local games, and urban farms.
    Bridging the Knowledge Gap
    Beyond the visual, Outside also provided copywriting and narrative support. They made sure the site explains "community power building" in accessible language. The "What is Community Power Building?" page breaks down basics, relevant vocabulary, and context. It clarifies that culture extends beyond art and music, encompassing traditions, stories, rituals, and shared spaces.
    A key feature is the "Knowledge Commons," a custom-built resource library. It serves both experienced practitioners and newcomers, fostering shared wisdom. This hub even accepts submissions, allowing C&CPF team members to edit and publish them.
    This project by Outside is a fantastic example of how thoughtful branding and visual identity can empower a mission. It shows that design isn't just about looking good; it's about building understanding, fostering connection, and driving meaningful change.
    What aspects of this purposeful design resonate most with you? Explore more of Outside's work and the Culture & Community Power Fund's initiatives to see how design can truly make an impact.
    Learn more about Outside's work
    Branding and visual identity artifacts

    Tags

    branding
    #purposeful #design #campampcpf039s #bold #new
    Purposeful Design: C&CPF's Bold New Visual Identity
    06/03 — 2025 by abduzeedo Explore the impactful branding and visual identity for Culture & Community Power Fund by Outside. See how design elevates community action. Hey creatives! Let's dive into some truly inspiring work today. Our friends at Outside, a global design and tech studio based in Kathmandu, recently rolled out a fresh brand and website for the Culture & Community Power Fund. This project isn't just about aesthetics; it's about design with a deeper purpose. Crafting a Visual Voice for Community Power C&CPF champions grassroots organizations. They focus on communities most affected by systemic oppression. Their mission involves direct funding, sharing resources, and building networks. Outside's goal was clear: uplift grantee work, create a wisdom hub, and clarify culture's role in social action . Elizabeth Lepro, Editorial Lead at Outside, shared that the project expanded their understanding of "culture." They aimed to visually inject the celebratory and communal aspects of shared spaces, rituals, stories, and traditions throughout the brand . This passion shines through in the final output. The Ampersand: A Symbol of Collaboration One standout element in C&CPF's new branding and visual identity is the ampersand. Outside emphasized this symbol in the logo, a direct nod to C&CPF's collaborative ethos. What's really clever is how they rendered the ampersand in various fonts. Each typeface reflects the diverse visions of C&CPF's partner-grantees. For instance, the rounded Akaya Kanadaka typeface conveys the joyful spirit of culturally infused community power building. Pilowlava, another typeface, speaks to a grantee-partner's work in urban farming and sustainability . It's a subtle yet powerful way to represent unity in diversity. Gritty, Bold, and Inviting Visuals Established in 2022, C&CPF is relatively new. They wanted to avoid looking overly traditional. Outside delivered a gritty, bold aesthetic, drawing inspiration from protest signs and zines. Snappy animations complement this vibe. They even provided image frames to unify varying aesthetics from featured organizations. The chosen color palette is a rich blend of orange, purple, yellow, black, and white. This combination expresses warmth and invitation, perfectly aligning with the Fund's focus on people and communities. The brand incorporates vibrant photography, showcasing scenes like festivals, local games, and urban farms. Bridging the Knowledge Gap Beyond the visual, Outside also provided copywriting and narrative support. They made sure the site explains "community power building" in accessible language. The "What is Community Power Building?" page breaks down basics, relevant vocabulary, and context. It clarifies that culture extends beyond art and music, encompassing traditions, stories, rituals, and shared spaces. A key feature is the "Knowledge Commons," a custom-built resource library. It serves both experienced practitioners and newcomers, fostering shared wisdom. This hub even accepts submissions, allowing C&CPF team members to edit and publish them. This project by Outside is a fantastic example of how thoughtful branding and visual identity can empower a mission. It shows that design isn't just about looking good; it's about building understanding, fostering connection, and driving meaningful change. What aspects of this purposeful design resonate most with you? Explore more of Outside's work and the Culture & Community Power Fund's initiatives to see how design can truly make an impact. Learn more about Outside's work Branding and visual identity artifacts Tags branding #purposeful #design #campampcpf039s #bold #new
    ABDUZEEDO.COM
    Purposeful Design: C&CPF's Bold New Visual Identity
    06/03 — 2025 by abduzeedo Explore the impactful branding and visual identity for Culture & Community Power Fund by Outside. See how design elevates community action. Hey creatives! Let's dive into some truly inspiring work today. Our friends at Outside, a global design and tech studio based in Kathmandu, recently rolled out a fresh brand and website for the Culture & Community Power Fund (C&CPF). This project isn't just about aesthetics; it's about design with a deeper purpose. Crafting a Visual Voice for Community Power C&CPF champions grassroots organizations. They focus on communities most affected by systemic oppression. Their mission involves direct funding, sharing resources, and building networks. Outside's goal was clear: uplift grantee work, create a wisdom hub, and clarify culture's role in social action . Elizabeth Lepro, Editorial Lead at Outside, shared that the project expanded their understanding of "culture." They aimed to visually inject the celebratory and communal aspects of shared spaces, rituals, stories, and traditions throughout the brand . This passion shines through in the final output. The Ampersand: A Symbol of Collaboration One standout element in C&CPF's new branding and visual identity is the ampersand (&). Outside emphasized this symbol in the logo, a direct nod to C&CPF's collaborative ethos. What's really clever is how they rendered the ampersand in various fonts. Each typeface reflects the diverse visions of C&CPF's partner-grantees. For instance, the rounded Akaya Kanadaka typeface conveys the joyful spirit of culturally infused community power building. Pilowlava, another typeface, speaks to a grantee-partner's work in urban farming and sustainability . It's a subtle yet powerful way to represent unity in diversity. Gritty, Bold, and Inviting Visuals Established in 2022, C&CPF is relatively new. They wanted to avoid looking overly traditional. Outside delivered a gritty, bold aesthetic, drawing inspiration from protest signs and zines. Snappy animations complement this vibe. They even provided image frames to unify varying aesthetics from featured organizations. The chosen color palette is a rich blend of orange, purple, yellow, black, and white. This combination expresses warmth and invitation, perfectly aligning with the Fund's focus on people and communities. The brand incorporates vibrant photography, showcasing scenes like festivals, local games, and urban farms. Bridging the Knowledge Gap Beyond the visual, Outside also provided copywriting and narrative support. They made sure the site explains "community power building" in accessible language. The "What is Community Power Building?" page breaks down basics, relevant vocabulary, and context. It clarifies that culture extends beyond art and music, encompassing traditions, stories, rituals, and shared spaces. A key feature is the "Knowledge Commons," a custom-built resource library. It serves both experienced practitioners and newcomers, fostering shared wisdom. This hub even accepts submissions, allowing C&CPF team members to edit and publish them. This project by Outside is a fantastic example of how thoughtful branding and visual identity can empower a mission. It shows that design isn't just about looking good; it's about building understanding, fostering connection, and driving meaningful change. What aspects of this purposeful design resonate most with you? Explore more of Outside's work and the Culture & Community Power Fund's initiatives to see how design can truly make an impact. Learn more about Outside's work Branding and visual identity artifacts Tags branding
    Like
    Love
    Wow
    Sad
    Angry
    337
    0 Комментарии 0 Поделились 0 предпросмотр
  • How to Effectively Implement Network Segmentation: 5 Key Steps and Use Cases

    Posted on : June 3, 2025

    By

    Tech World Times

    Technology 

    Rate this post

    This article walks you through five practical steps to implement network segmentation effectively, backed by real-world use cases that showcase its value in different industries.
    Networks are constantly expanding across offices, cloud services, remote users, and connected devices. With so many moving parts, security gaps can easily form. Once attackers breach a weak point, they often move freely across the network, targeting critical systems and sensitive data.
    That’s where network segmentation comes in. It’s a practical approach to divide your network into smaller, manageable zones to control access, limit exposure, and isolate threats before they spread. But simply deploying VLANs or access rules isn’t enough. True segmentation needs planning, alignment with your business, and the right mix of technology.
    Step 1: Assess and Map Your Current Network
    Start by figuring out what’s on your network and how it communicates.

    Inventory Devices and Applications: List all system servers, user machines, IoT devices, cloud assets.
    Map Data Flows: Understand how applications and services interact. Which systems talk to each other? What ports and protocols are used?
    Identify Critical Assets: Highlight the systems that handle sensitive data, such as payment processing, health records, or intellectual property.

    Tip: Network discovery tools or NAC solutions can automate asset inventory and reveal communication paths you might miss.
    Step 2: Define Segmentation Goals and Policies
    Once you understand your environment, it’s time to set your objectives.

    Security Objectives: Do you want to reduce lateral movement, isolate sensitive systems, or meet a compliance mandate?
    Business Alignment: Segment by business unit, sensitivity of data, or risk profile-whatever makes the most operational sense.
    Compliance Requirements: PCI DSS, HIPAA, and other standards often require network segmentation.

    Example: A healthcare provider might create separate zones for patient records, lab equipment, guest Wi-Fi, and billing systems.
    Step 3: Choose the Right Segmentation Method
    Segmentation can be done in several ways. The right approach depends on your infrastructure goals and types:
    a. Physical Segmentation
    Use separate routers, switches, and cables. This offers strong isolation but can be costly and harder to scale.
    b. Logical SegmentationGroup devices into virtual segments based on function or department. It’s efficient and easier to manage in most environments.
    c. Micro segmentation
    Control access at the workload or application level using software-defined policies. Ideal for cloud or virtualized environments where you need granular control.
    d. Cloud Segmentation
    In the cloud, segmentation happens using security groups, VPCs, and IAM roles to isolate workloads and define access rules.
    Use a combination- VLANs for broader segmentation and micro segmentation for finer control where it matters.
    Step 4: Implement Controls and Monitor Traffic
    Time to put those policies into action.

    Firewalls and ACLs: Use access controls to manage what can move between zones. Block anything that isn’t explicitly allowed.
    Zero Trust Principles: Never assume trust between segments. Always validate identity and permissions.
    Monitoring and Alerts: Use your SIEM, flow monitoring tools, or NDR platform to watch for unusual traffic or policy violations.

    Common Pitfall: Avoid “allow all” rules between segments, it defeats the purpose.
    Step 5: Test, Validate, and Fine-Tune
    Even a well-designed segmentation plan can have gaps. Regular validation helps ensure it works as expected.

    Penetration Testing: Simulate attacks to check if boundaries hold.
    Review Policies: Business needs to change your segmentation strategy too.
    Performance Monitoring: Make sure segmentation doesn’t impact legitimate operations or application performance.

    Automation tools can help simplify this process and ensure consistency.
    Real-World Use Cases of Network Segmentation
    1. Healthcare – Protecting Patient Data and Devices
    Hospitals use segmentation to keep medical devices, patient records, and visitor Wi-Fi on separate zones. This prevents an infected guest device from interfering with critical systems.
    Result: Reduced attack surface and HIPAA compliance.
    2. Manufacturing – Isolating Industrial Systems
    Production environments often have fragile legacy systems. Segmenting OTfrom IT ensures ransomware or malware doesn’t disrupt manufacturing lines.
    Result: More uptime and fewer operational risks.
    3. Finance – Securing Payment Systems
    Banks and payment providers use segmentation to isolate cardholder data environmentsfrom the rest of the corporate network. This helps meet PCI DSS and keeps sensitive data protected.
    Result: Easier audits and stronger data security.
    4. Education – Managing High-Volume BYOD Traffic
    Universities segment student Wi-Fi, research labs, and administrative systems. This keeps a vulnerable student device from spreading malware to faculty or internal systems.
    Result: Safer environment for open access campuses.
    5. Cloud – Segmenting Apps and Microservices
    In the cloud, developers use security groups, VPCs, and IAM roles to isolate applications and limit who can access what. This reduces risk if one workload is compromised.
    Result: Controlled access and better cloud hygiene.
    Common Challenges

    Legacy Tech: Older devices may not support modern segmentation.
    Lack of Visibility: Hard to secure what you don’t know exists.
    Operational Hiccups: Poorly planned segmentation can block business workflows.
    Policy Complexity: Keeping access rules up to date across dynamic environments takes effort.

    Best Practices

    Start with High-Risk Areas: Prioritize zones handling sensitive data or vulnerable systems.
    Keep Documentation Updated: Maintain clear diagrams and policy records.
    Align Teams: Get buy-in from IT, security, and business units.
    Automate Where You Can: Especially for monitoring and policy enforcement.
    Review Regularly: Networks evolve- so should your segmentation.

    Final Thoughts
    Segmentation isn’t about creating walls it’s about building smart pathways. Done right, it helps you take control of your network, reduce risk, and respond faster when something goes wrong.
    It’s a foundational layer of cybersecurity that pays off in resilience, compliance, and peace of mind.
    About the Author:
    Prajwal Gowda is a cybersecurity expert with 10+ years of experience. He has built businesses and was a Business Unit Head for Compliance and Testing services. Currently, he is the Chief Technology Officer at Ampcus Cyber, leading the company’s technology strategy and innovation efforts. He has also been involved in the Payment Card Industry, Software Security Framework, ISO 27001 Controls Gap Analysis, ISMS, Risk Analysis, OCTAVE, ISO 27005, Information Security Audit and Network Security. Prajwal is a Master Trainer who has conducted 100+ cybersecurity training sessions worldwide.
    Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #how #effectively #implement #network #segmentation
    How to Effectively Implement Network Segmentation: 5 Key Steps and Use Cases
    Posted on : June 3, 2025 By Tech World Times Technology  Rate this post This article walks you through five practical steps to implement network segmentation effectively, backed by real-world use cases that showcase its value in different industries. Networks are constantly expanding across offices, cloud services, remote users, and connected devices. With so many moving parts, security gaps can easily form. Once attackers breach a weak point, they often move freely across the network, targeting critical systems and sensitive data. That’s where network segmentation comes in. It’s a practical approach to divide your network into smaller, manageable zones to control access, limit exposure, and isolate threats before they spread. But simply deploying VLANs or access rules isn’t enough. True segmentation needs planning, alignment with your business, and the right mix of technology. Step 1: Assess and Map Your Current Network Start by figuring out what’s on your network and how it communicates. Inventory Devices and Applications: List all system servers, user machines, IoT devices, cloud assets. Map Data Flows: Understand how applications and services interact. Which systems talk to each other? What ports and protocols are used? Identify Critical Assets: Highlight the systems that handle sensitive data, such as payment processing, health records, or intellectual property. Tip: Network discovery tools or NAC solutions can automate asset inventory and reveal communication paths you might miss. Step 2: Define Segmentation Goals and Policies Once you understand your environment, it’s time to set your objectives. Security Objectives: Do you want to reduce lateral movement, isolate sensitive systems, or meet a compliance mandate? Business Alignment: Segment by business unit, sensitivity of data, or risk profile-whatever makes the most operational sense. Compliance Requirements: PCI DSS, HIPAA, and other standards often require network segmentation. Example: A healthcare provider might create separate zones for patient records, lab equipment, guest Wi-Fi, and billing systems. Step 3: Choose the Right Segmentation Method Segmentation can be done in several ways. The right approach depends on your infrastructure goals and types: a. Physical Segmentation Use separate routers, switches, and cables. This offers strong isolation but can be costly and harder to scale. b. Logical SegmentationGroup devices into virtual segments based on function or department. It’s efficient and easier to manage in most environments. c. Micro segmentation Control access at the workload or application level using software-defined policies. Ideal for cloud or virtualized environments where you need granular control. d. Cloud Segmentation In the cloud, segmentation happens using security groups, VPCs, and IAM roles to isolate workloads and define access rules. Use a combination- VLANs for broader segmentation and micro segmentation for finer control where it matters. Step 4: Implement Controls and Monitor Traffic Time to put those policies into action. Firewalls and ACLs: Use access controls to manage what can move between zones. Block anything that isn’t explicitly allowed. Zero Trust Principles: Never assume trust between segments. Always validate identity and permissions. Monitoring and Alerts: Use your SIEM, flow monitoring tools, or NDR platform to watch for unusual traffic or policy violations. Common Pitfall: Avoid “allow all” rules between segments, it defeats the purpose. Step 5: Test, Validate, and Fine-Tune Even a well-designed segmentation plan can have gaps. Regular validation helps ensure it works as expected. Penetration Testing: Simulate attacks to check if boundaries hold. Review Policies: Business needs to change your segmentation strategy too. Performance Monitoring: Make sure segmentation doesn’t impact legitimate operations or application performance. Automation tools can help simplify this process and ensure consistency. Real-World Use Cases of Network Segmentation 1. Healthcare – Protecting Patient Data and Devices Hospitals use segmentation to keep medical devices, patient records, and visitor Wi-Fi on separate zones. This prevents an infected guest device from interfering with critical systems. Result: Reduced attack surface and HIPAA compliance. 2. Manufacturing – Isolating Industrial Systems Production environments often have fragile legacy systems. Segmenting OTfrom IT ensures ransomware or malware doesn’t disrupt manufacturing lines. Result: More uptime and fewer operational risks. 3. Finance – Securing Payment Systems Banks and payment providers use segmentation to isolate cardholder data environmentsfrom the rest of the corporate network. This helps meet PCI DSS and keeps sensitive data protected. Result: Easier audits and stronger data security. 4. Education – Managing High-Volume BYOD Traffic Universities segment student Wi-Fi, research labs, and administrative systems. This keeps a vulnerable student device from spreading malware to faculty or internal systems. Result: Safer environment for open access campuses. 5. Cloud – Segmenting Apps and Microservices In the cloud, developers use security groups, VPCs, and IAM roles to isolate applications and limit who can access what. This reduces risk if one workload is compromised. Result: Controlled access and better cloud hygiene. Common Challenges Legacy Tech: Older devices may not support modern segmentation. Lack of Visibility: Hard to secure what you don’t know exists. Operational Hiccups: Poorly planned segmentation can block business workflows. Policy Complexity: Keeping access rules up to date across dynamic environments takes effort. Best Practices Start with High-Risk Areas: Prioritize zones handling sensitive data or vulnerable systems. Keep Documentation Updated: Maintain clear diagrams and policy records. Align Teams: Get buy-in from IT, security, and business units. Automate Where You Can: Especially for monitoring and policy enforcement. Review Regularly: Networks evolve- so should your segmentation. Final Thoughts Segmentation isn’t about creating walls it’s about building smart pathways. Done right, it helps you take control of your network, reduce risk, and respond faster when something goes wrong. It’s a foundational layer of cybersecurity that pays off in resilience, compliance, and peace of mind. About the Author: Prajwal Gowda is a cybersecurity expert with 10+ years of experience. He has built businesses and was a Business Unit Head for Compliance and Testing services. Currently, he is the Chief Technology Officer at Ampcus Cyber, leading the company’s technology strategy and innovation efforts. He has also been involved in the Payment Card Industry, Software Security Framework, ISO 27001 Controls Gap Analysis, ISMS, Risk Analysis, OCTAVE, ISO 27005, Information Security Audit and Network Security. Prajwal is a Master Trainer who has conducted 100+ cybersecurity training sessions worldwide. Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #how #effectively #implement #network #segmentation
    TECHWORLDTIMES.COM
    How to Effectively Implement Network Segmentation: 5 Key Steps and Use Cases
    Posted on : June 3, 2025 By Tech World Times Technology  Rate this post This article walks you through five practical steps to implement network segmentation effectively, backed by real-world use cases that showcase its value in different industries. Networks are constantly expanding across offices, cloud services, remote users, and connected devices. With so many moving parts, security gaps can easily form. Once attackers breach a weak point, they often move freely across the network, targeting critical systems and sensitive data. That’s where network segmentation comes in. It’s a practical approach to divide your network into smaller, manageable zones to control access, limit exposure, and isolate threats before they spread. But simply deploying VLANs or access rules isn’t enough. True segmentation needs planning, alignment with your business, and the right mix of technology. Step 1: Assess and Map Your Current Network Start by figuring out what’s on your network and how it communicates. Inventory Devices and Applications: List all system servers, user machines, IoT devices, cloud assets. Map Data Flows: Understand how applications and services interact. Which systems talk to each other? What ports and protocols are used? Identify Critical Assets: Highlight the systems that handle sensitive data, such as payment processing, health records, or intellectual property. Tip: Network discovery tools or NAC solutions can automate asset inventory and reveal communication paths you might miss. Step 2: Define Segmentation Goals and Policies Once you understand your environment, it’s time to set your objectives. Security Objectives: Do you want to reduce lateral movement, isolate sensitive systems, or meet a compliance mandate? Business Alignment: Segment by business unit, sensitivity of data, or risk profile-whatever makes the most operational sense. Compliance Requirements: PCI DSS, HIPAA, and other standards often require network segmentation. Example: A healthcare provider might create separate zones for patient records, lab equipment, guest Wi-Fi, and billing systems. Step 3: Choose the Right Segmentation Method Segmentation can be done in several ways. The right approach depends on your infrastructure goals and types: a. Physical Segmentation Use separate routers, switches, and cables. This offers strong isolation but can be costly and harder to scale. b. Logical Segmentation (VLANs/Subnets) Group devices into virtual segments based on function or department. It’s efficient and easier to manage in most environments. c. Micro segmentation Control access at the workload or application level using software-defined policies. Ideal for cloud or virtualized environments where you need granular control. d. Cloud Segmentation In the cloud, segmentation happens using security groups, VPCs, and IAM roles to isolate workloads and define access rules. Use a combination- VLANs for broader segmentation and micro segmentation for finer control where it matters. Step 4: Implement Controls and Monitor Traffic Time to put those policies into action. Firewalls and ACLs: Use access controls to manage what can move between zones. Block anything that isn’t explicitly allowed. Zero Trust Principles: Never assume trust between segments. Always validate identity and permissions. Monitoring and Alerts: Use your SIEM, flow monitoring tools, or NDR platform to watch for unusual traffic or policy violations. Common Pitfall: Avoid “allow all” rules between segments, it defeats the purpose. Step 5: Test, Validate, and Fine-Tune Even a well-designed segmentation plan can have gaps. Regular validation helps ensure it works as expected. Penetration Testing: Simulate attacks to check if boundaries hold. Review Policies: Business needs to change your segmentation strategy too. Performance Monitoring: Make sure segmentation doesn’t impact legitimate operations or application performance. Automation tools can help simplify this process and ensure consistency. Real-World Use Cases of Network Segmentation 1. Healthcare – Protecting Patient Data and Devices Hospitals use segmentation to keep medical devices, patient records, and visitor Wi-Fi on separate zones. This prevents an infected guest device from interfering with critical systems. Result: Reduced attack surface and HIPAA compliance. 2. Manufacturing – Isolating Industrial Systems Production environments often have fragile legacy systems. Segmenting OT (Operational Technology) from IT ensures ransomware or malware doesn’t disrupt manufacturing lines. Result: More uptime and fewer operational risks. 3. Finance – Securing Payment Systems Banks and payment providers use segmentation to isolate cardholder data environments (CDE) from the rest of the corporate network. This helps meet PCI DSS and keeps sensitive data protected. Result: Easier audits and stronger data security. 4. Education – Managing High-Volume BYOD Traffic Universities segment student Wi-Fi, research labs, and administrative systems. This keeps a vulnerable student device from spreading malware to faculty or internal systems. Result: Safer environment for open access campuses. 5. Cloud – Segmenting Apps and Microservices In the cloud, developers use security groups, VPCs, and IAM roles to isolate applications and limit who can access what. This reduces risk if one workload is compromised. Result: Controlled access and better cloud hygiene. Common Challenges Legacy Tech: Older devices may not support modern segmentation. Lack of Visibility: Hard to secure what you don’t know exists. Operational Hiccups: Poorly planned segmentation can block business workflows. Policy Complexity: Keeping access rules up to date across dynamic environments takes effort. Best Practices Start with High-Risk Areas: Prioritize zones handling sensitive data or vulnerable systems. Keep Documentation Updated: Maintain clear diagrams and policy records. Align Teams: Get buy-in from IT, security, and business units. Automate Where You Can: Especially for monitoring and policy enforcement. Review Regularly: Networks evolve- so should your segmentation. Final Thoughts Segmentation isn’t about creating walls it’s about building smart pathways. Done right, it helps you take control of your network, reduce risk, and respond faster when something goes wrong. It’s a foundational layer of cybersecurity that pays off in resilience, compliance, and peace of mind. About the Author: Prajwal Gowda is a cybersecurity expert with 10+ years of experience. He has built businesses and was a Business Unit Head for Compliance and Testing services. Currently, he is the Chief Technology Officer at Ampcus Cyber, leading the company’s technology strategy and innovation efforts. He has also been involved in the Payment Card Industry, Software Security Framework, ISO 27001 Controls Gap Analysis, ISMS, Risk Analysis, OCTAVE, ISO 27005, Information Security Audit and Network Security. Prajwal is a Master Trainer who has conducted 100+ cybersecurity training sessions worldwide. Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    0 Комментарии 0 Поделились 0 предпросмотр
  • The Design Intelligence Awards are Open for Entry

    The Design Intelligence Awards are Open for Entry The DIA, an international design competition, founded in 2015 by the China Academy of Art in collaboration with other organizations, has a mission to connect cultures through design by recognizing innovative, forward-thinking, and sustainable solutions to real-world problems.DIA brings together a global network of entrepreneurs, creatives, and innovators to address major societal challenges. It is considered one of the most prestigious international design awards, despite its relatively recent inception.It's time to submit your entry which is free until June 20th!Product Award CategoriesCultural Innovation Focus: Culture as a driving force for design. Recognizes: Revival of traditional culture Design craftsmanship Cultural IP value and sustainable development. Eligible Entries: Culture gifts, stationery, packaging Fashion accessories, tableware, furniture, lighting products related to cultural tourism and social innovation.Life Wisdom Focus: Enhancing daily living and addressing societal needs. Recognizes: Intelligent design in everyday life care for vulnerable groups. Eligible Entries: Electronics, digital devices, smart home technology, kitchen/bathroom essentials, household appliances, elderly care, maternal/child supplies, personal care, toys, pet products, leisure/sports gear, disaster prevention items, use of new tech/materials. Industrial Equipment Focus: Driving industrial transformation and efficiency. Recognizes: Strategic, emerging industry tools, and high-efficiency production solutions. Eligible Entries: Transportation, logistics, medical and construction equipment, agricultural, forestry, and military tools, office equipment, green energy solutions, robotics, and automation equipment. Development and Application of AI Focus: Innovations in artificial intelligence and smart technologies. Recognizes: Forward-looking AI applications across industries. Eligible Entries: Smart cities, mobility, business, healthcare, education, smart community systems, industrial internet, VR, and spatial computing.Use this Invitation Code: US2025-PMPC1KK to skip the first review round and fast track to the next level!
    #design #intelligence #awards #are #open
    The Design Intelligence Awards are Open for Entry
    The Design Intelligence Awards are Open for Entry The DIA, an international design competition, founded in 2015 by the China Academy of Art in collaboration with other organizations, has a mission to connect cultures through design by recognizing innovative, forward-thinking, and sustainable solutions to real-world problems.DIA brings together a global network of entrepreneurs, creatives, and innovators to address major societal challenges. It is considered one of the most prestigious international design awards, despite its relatively recent inception.It's time to submit your entry which is free until June 20th!Product Award CategoriesCultural Innovation Focus: Culture as a driving force for design. Recognizes: Revival of traditional culture Design craftsmanship Cultural IP value and sustainable development. Eligible Entries: Culture gifts, stationery, packaging Fashion accessories, tableware, furniture, lighting products related to cultural tourism and social innovation.Life Wisdom Focus: Enhancing daily living and addressing societal needs. Recognizes: Intelligent design in everyday life care for vulnerable groups. Eligible Entries: Electronics, digital devices, smart home technology, kitchen/bathroom essentials, household appliances, elderly care, maternal/child supplies, personal care, toys, pet products, leisure/sports gear, disaster prevention items, use of new tech/materials. Industrial Equipment Focus: Driving industrial transformation and efficiency. Recognizes: Strategic, emerging industry tools, and high-efficiency production solutions. Eligible Entries: Transportation, logistics, medical and construction equipment, agricultural, forestry, and military tools, office equipment, green energy solutions, robotics, and automation equipment. Development and Application of AI Focus: Innovations in artificial intelligence and smart technologies. Recognizes: Forward-looking AI applications across industries. Eligible Entries: Smart cities, mobility, business, healthcare, education, smart community systems, industrial internet, VR, and spatial computing.Use this Invitation Code: US2025-PMPC1KK to skip the first review round and fast track to the next level! #design #intelligence #awards #are #open
    WWW.CORE77.COM
    The Design Intelligence Awards are Open for Entry
    The Design Intelligence Awards are Open for Entry The DIA, an international design competition, founded in 2015 by the China Academy of Art in collaboration with other organizations, has a mission to connect cultures through design by recognizing innovative, forward-thinking, and sustainable solutions to real-world problems.DIA brings together a global network of entrepreneurs, creatives, and innovators to address major societal challenges. It is considered one of the most prestigious international design awards, despite its relatively recent inception.It's time to submit your entry which is free until June 20th!Product Award CategoriesCultural Innovation Focus: Culture as a driving force for design. Recognizes: Revival of traditional culture Design craftsmanship Cultural IP value and sustainable development. Eligible Entries: Culture gifts, stationery, packaging Fashion accessories, tableware, furniture, lighting products related to cultural tourism and social innovation.Life Wisdom Focus: Enhancing daily living and addressing societal needs. Recognizes: Intelligent design in everyday life care for vulnerable groups. Eligible Entries: Electronics, digital devices, smart home technology, kitchen/bathroom essentials, household appliances, elderly care, maternal/child supplies, personal care, toys, pet products, leisure/sports gear, disaster prevention items, use of new tech/materials. Industrial Equipment Focus: Driving industrial transformation and efficiency. Recognizes: Strategic, emerging industry tools, and high-efficiency production solutions. Eligible Entries: Transportation, logistics, medical and construction equipment, agricultural, forestry, and military tools, office equipment, green energy solutions, robotics, and automation equipment. Development and Application of AI Focus: Innovations in artificial intelligence and smart technologies. Recognizes: Forward-looking AI applications across industries. Eligible Entries: Smart cities, mobility, business, healthcare, education, smart community systems, industrial internet, VR, and spatial computing.Use this Invitation Code: US2025-PMPC1KK to skip the first review round and fast track to the next level!
    0 Комментарии 0 Поделились 0 предпросмотр
  • BYOD like it’s 2025

    Hard as it is to believe, there was a time when using any personal technology at work was such a radical concept that most people wouldn’t even consider it an option. IT departments went to great lengths to prevent workers from using their own devices, computers, apps/subscriptions, email, and cloud services.

    The release of the iPhone in 2007 began to change that. Suddenly people were discovering that the smartphone they bought for their personal use could make them more efficient and productive at work as well.

    But it was Apple’s launch of its mobile device management framework in 2010 that truly created the bring your own device movement. MDM meant that users could bring their personal devices to work, and IT departments could secure those devices as needed. Almost instantly, BYOD was something that companies began to support in industries across the board.

    Fifteen years later, BYOD is fully mainstream, and a majority of businesses actively support it. But advances in technology, changing user expectations, and the fallout from Covid’s remote work mandateshave shifted the landscape, sometimes without being overtly visible.

    With that in mind, I decided to reexamine the assumptions and realities of BYOD and see what has and hasn’t changed in the past decade and a half.

    BYOD is everywhere but device management isn’t

    The exact numbers on BYOD adoption vary depending on the source you look to and how it’s being measured. A 2022 paper from HPE claims that 90% of employees use a mix of work and personal devices on the job, while Cybersecurity Insiders says that 82% of organizations have a BYOD program. However you look at it, BYOD is now massively entrenched in our work culture and extends beyond just employees and managers. According to data from Samsung, 61% of organizations support BYOD for non-employees including contractors, partners, and suppliers to varying degrees.

    But overtly or tacitly accepting BYOD doesn’t mean that companies actively manage BYOD devices. Cybersecurity Insiders dataalso indicates that as many as 70% of BYOD devices used in the workplace aren’t managed — a number that may seem shocking, but that figure includes personal devices used by non-employees such as contractors.

    About those cost savings…

    In the early days, there was an assumption that BYOD would lower hardware and service costs, but that wasn’t certain. Today there’s data.

    In the early 2010s, Cisco estimated a + annual savings per employee, though more recent data from Samsungpegs the savings as significantly lower at Despite that disparity, it’s obvious that there are savings to be had, and with significantly climbing smartphone prices, those savings are is poised to grow rather than shrink.

    Of course, the cost of managing devices needs to be factored in. That cost can vary widely depending on the vendor, specific products, and adopted features, but some MDM vendors charge as little as per user per month. The cost of providing employees company-purchased apps is also worth noting, though that falls more in line with traditional software procurement.

    Productivity gains are real, but so are distractions

    The data is clear that there can be significant gains in productivity attached to BYOD. Samsung estimates that workers using their own devices can gain about an hour of productive worktime per day and Cybersecurity Insiders says that 68% of businesses see some degree of productivity increases.

    Although the gains are significant, personal devices can also distract workers more than company-owned devices, with personal notifications, social media accounts, news, and games being the major time-sink culprits. This has the potential to be a real issue, as these apps can become addictive and their use compulsive.

    Tools of the trade

    When I think back to the first five to ten years after Apple introduced MDM, it reminds me of the later stages of the birth of the solar system, with dozens of companies offering discrete tools that solved part of the mobility and BYOD puzzle, many colliding into each other or being flung out of existence. Some focused on just supporting the MDM server spec sheet, others on cloud storage, securing and managing access to corporate content, corporate app purchasing and management, secure connectivity, user and identity management, Office alternatives, and more.

    Along the way, major enterprise vendors began dominating the market, some by acquisition and others by building out existing capabilities, although there were also businesses that came out of mergers of some of the new players as well.

    As the market matured, it became easy to pick a single vendor to provide all enterprise mobility and BYOD needs rather than relying on multiple companies focusing on one particular requirement.

    Multiplatform support has morphed into something very different

    The iPhone was the clear early standard for supporting personal devices at work, in part because the hardware, operating system, and MDM mechanics were all created by a single vendor. Going multiplatform was typically assumed to mean iOS and Android — and Android was a fragmented mess of different hardware makers with sometimes widely varying devices and customized Android variantsthat resulted in no coherent OS update strategy.

    The gap in management capabilities has narrowed significantly since then, with Google taking a much more active role in courting and supporting enterprise customers and providing a clear and coherent enterprise strategy across a wide swath of major Android phone makers and other vendors.

    But that isn’t the only massive shift in what it means to be multiplatform. Today the personal devices used in the workplaceinclude non-phone entries including Macs, Apple TVs, Chromebooks, and Windows PCs — with Macs and PCs making up a significant number of BYOD devices.

    Most MDM suites support this full range of devices to one degree or another, but support costs can rise as more and more platformsare implemented — and those costs vary by platform, with general agreement that Apple devices provide the greatest savings when it comes to technical support.

    How Covid changed the BYOD equation

    I’m pretty sure that in 2010, not one person on the planet was predicting a global pandemic that would lead to the vast majority of knowledge workers working from home within a decade. Yet, as we all remember, that’s exactly what happened.

    The need to work from home encouraged broader adoption of personal devices as well as ancillary technologies ranging from peripherals/accessories to connectivity. Despite a litany of return-to-office mandates in recent years, remote work is here to stay, whether that’s full-time, hybrid, or just working outside traditional office hours or location.

    Samsung notes that 61% of businesses expect employees to work remotely to some degree, while Robert Half reports that only 61% of new job postings in 2024 had full in-office requirements. And data from WFH Research shows that at the start of 2025, employees are working remotely 28% of the time.

    Passing support to new generations

    One challenge for BYOD has always been user support and education. With two generations of digital natives now comprsing more than half the workforce, support and education needs have changed. Both millennials and Gen Z have grown up with the internet and mobile devices, which makes them more comfortable making technology decisions and troubleshooting problems than baby boomers and Gen X.

    This doesn’t mean that they don’t need tech support, but they do tend to need less hand-holding and don’t instinctively reach for the phone to access that support. Thus, there’s an ongoing shift to self-support resources and other, less time-intensive, models with text chat being the most common — be it with a person or a bot.

    They also have different expectations in areas like privacy, processes and policies, and work-life balance. Those expectations make it more important for companies to delineate their BYOD and other tech policies as well as to explain the rationale for them. This means that user education remains important, particularly in a rapidly changing landscape. It also means that policies should be communicated in more concise and easily digestible forms than large monolithic pages of legalese.

    Users actually want to updatetheir devices

    Twenty years ago, the idea of updating workplace technology was typically met with a groan from users who didn’t appreciate downtime or changes in the way things looked and worked. Even as BYOD gained traction, getting users to update their devices wasn’t always easy and required a certain amount of prompting or policing. While resistance to change will never truly die out, most smartphoneusers actively update on their own because of the new features that come with OS updates and new hardware. Upgrades are something to get excited about.

    BYOD users also tend to be more careful with their devices just because they are their own devices. Likewise, they’re more on point with repairs or replacements and are keen to handle those issues on their own.

    Security is ever evolving

    Security has always beena major concern when it comes to BYOD, and the threats will always be evolving. The biggest concerns stem from user behavior, with users losing devices being one big concern. Verizon reports that more than 90% of security incidents involving lost or stolen devices resulted in an unauthorized data breach, and 42% involved the leaking of internal data. Another big concern is users falling prey to malicious actors: falling for phishing schemes, downloading malware, allowing corporate data to be placed in public spaces, or letting others use their devices.

    Devices themselves can be major targets, with attacks coming from different directions like public Wi-Fi, malicious apps or apps that are not designed to safeguard data properly, OS and network vulnerabilities, and so on. Supporting infrastructure can also be a weak point.

    These threats are real. Research by JumpCloud indicates that 20% of businesses have seen malware as a result of unmanaged devices, and nearly half aren’t able to tell if unmanaged devices have compromised their security. Cybersecurity Insiders research shows a similar statistic of 22%, while also noting that 22% of BYOD devices have connected to malicious wireless networks.

    Shadow IT will always exist

    Shadow IT is a phenomenon that has existed for decades but grew rapidly alongside BYOD, when users began leveraging their personal devices, apps, and services for work without IT’s involvement, knowledge, or consent. Almost every company has some degree of shadow IT, and thus unmanaged devices or other technologies.

    Organizations need to educate usersabout security and keeping their devices safe. They also need to engage users involved in shadow IT and make allies out of them, because shadow IT often stems from unmet technological needs.

    Then there’s the trust component. Many users remain uncomfortable letting IT manage their devices, because they don’t understand what IT will be able to see on them. This is a user education problem that all companies need to address clearly and unequivocally.

    Still the same goals

    Although much has changed about BYOD, the basic goal remains the same: allowing workers to use the devices and other tools they are comfortable with and already own… and are likely to use whether sanctioned to or not.
    #byod #like #its
    BYOD like it’s 2025
    Hard as it is to believe, there was a time when using any personal technology at work was such a radical concept that most people wouldn’t even consider it an option. IT departments went to great lengths to prevent workers from using their own devices, computers, apps/subscriptions, email, and cloud services. The release of the iPhone in 2007 began to change that. Suddenly people were discovering that the smartphone they bought for their personal use could make them more efficient and productive at work as well. But it was Apple’s launch of its mobile device management framework in 2010 that truly created the bring your own device movement. MDM meant that users could bring their personal devices to work, and IT departments could secure those devices as needed. Almost instantly, BYOD was something that companies began to support in industries across the board. Fifteen years later, BYOD is fully mainstream, and a majority of businesses actively support it. But advances in technology, changing user expectations, and the fallout from Covid’s remote work mandateshave shifted the landscape, sometimes without being overtly visible. With that in mind, I decided to reexamine the assumptions and realities of BYOD and see what has and hasn’t changed in the past decade and a half. BYOD is everywhere but device management isn’t The exact numbers on BYOD adoption vary depending on the source you look to and how it’s being measured. A 2022 paper from HPE claims that 90% of employees use a mix of work and personal devices on the job, while Cybersecurity Insiders says that 82% of organizations have a BYOD program. However you look at it, BYOD is now massively entrenched in our work culture and extends beyond just employees and managers. According to data from Samsung, 61% of organizations support BYOD for non-employees including contractors, partners, and suppliers to varying degrees. But overtly or tacitly accepting BYOD doesn’t mean that companies actively manage BYOD devices. Cybersecurity Insiders dataalso indicates that as many as 70% of BYOD devices used in the workplace aren’t managed — a number that may seem shocking, but that figure includes personal devices used by non-employees such as contractors. About those cost savings… In the early days, there was an assumption that BYOD would lower hardware and service costs, but that wasn’t certain. Today there’s data. In the early 2010s, Cisco estimated a + annual savings per employee, though more recent data from Samsungpegs the savings as significantly lower at Despite that disparity, it’s obvious that there are savings to be had, and with significantly climbing smartphone prices, those savings are is poised to grow rather than shrink. Of course, the cost of managing devices needs to be factored in. That cost can vary widely depending on the vendor, specific products, and adopted features, but some MDM vendors charge as little as per user per month. The cost of providing employees company-purchased apps is also worth noting, though that falls more in line with traditional software procurement. Productivity gains are real, but so are distractions The data is clear that there can be significant gains in productivity attached to BYOD. Samsung estimates that workers using their own devices can gain about an hour of productive worktime per day and Cybersecurity Insiders says that 68% of businesses see some degree of productivity increases. Although the gains are significant, personal devices can also distract workers more than company-owned devices, with personal notifications, social media accounts, news, and games being the major time-sink culprits. This has the potential to be a real issue, as these apps can become addictive and their use compulsive. Tools of the trade When I think back to the first five to ten years after Apple introduced MDM, it reminds me of the later stages of the birth of the solar system, with dozens of companies offering discrete tools that solved part of the mobility and BYOD puzzle, many colliding into each other or being flung out of existence. Some focused on just supporting the MDM server spec sheet, others on cloud storage, securing and managing access to corporate content, corporate app purchasing and management, secure connectivity, user and identity management, Office alternatives, and more. Along the way, major enterprise vendors began dominating the market, some by acquisition and others by building out existing capabilities, although there were also businesses that came out of mergers of some of the new players as well. As the market matured, it became easy to pick a single vendor to provide all enterprise mobility and BYOD needs rather than relying on multiple companies focusing on one particular requirement. Multiplatform support has morphed into something very different The iPhone was the clear early standard for supporting personal devices at work, in part because the hardware, operating system, and MDM mechanics were all created by a single vendor. Going multiplatform was typically assumed to mean iOS and Android — and Android was a fragmented mess of different hardware makers with sometimes widely varying devices and customized Android variantsthat resulted in no coherent OS update strategy. The gap in management capabilities has narrowed significantly since then, with Google taking a much more active role in courting and supporting enterprise customers and providing a clear and coherent enterprise strategy across a wide swath of major Android phone makers and other vendors. But that isn’t the only massive shift in what it means to be multiplatform. Today the personal devices used in the workplaceinclude non-phone entries including Macs, Apple TVs, Chromebooks, and Windows PCs — with Macs and PCs making up a significant number of BYOD devices. Most MDM suites support this full range of devices to one degree or another, but support costs can rise as more and more platformsare implemented — and those costs vary by platform, with general agreement that Apple devices provide the greatest savings when it comes to technical support. How Covid changed the BYOD equation I’m pretty sure that in 2010, not one person on the planet was predicting a global pandemic that would lead to the vast majority of knowledge workers working from home within a decade. Yet, as we all remember, that’s exactly what happened. The need to work from home encouraged broader adoption of personal devices as well as ancillary technologies ranging from peripherals/accessories to connectivity. Despite a litany of return-to-office mandates in recent years, remote work is here to stay, whether that’s full-time, hybrid, or just working outside traditional office hours or location. Samsung notes that 61% of businesses expect employees to work remotely to some degree, while Robert Half reports that only 61% of new job postings in 2024 had full in-office requirements. And data from WFH Research shows that at the start of 2025, employees are working remotely 28% of the time. Passing support to new generations One challenge for BYOD has always been user support and education. With two generations of digital natives now comprsing more than half the workforce, support and education needs have changed. Both millennials and Gen Z have grown up with the internet and mobile devices, which makes them more comfortable making technology decisions and troubleshooting problems than baby boomers and Gen X. This doesn’t mean that they don’t need tech support, but they do tend to need less hand-holding and don’t instinctively reach for the phone to access that support. Thus, there’s an ongoing shift to self-support resources and other, less time-intensive, models with text chat being the most common — be it with a person or a bot. They also have different expectations in areas like privacy, processes and policies, and work-life balance. Those expectations make it more important for companies to delineate their BYOD and other tech policies as well as to explain the rationale for them. This means that user education remains important, particularly in a rapidly changing landscape. It also means that policies should be communicated in more concise and easily digestible forms than large monolithic pages of legalese. Users actually want to updatetheir devices Twenty years ago, the idea of updating workplace technology was typically met with a groan from users who didn’t appreciate downtime or changes in the way things looked and worked. Even as BYOD gained traction, getting users to update their devices wasn’t always easy and required a certain amount of prompting or policing. While resistance to change will never truly die out, most smartphoneusers actively update on their own because of the new features that come with OS updates and new hardware. Upgrades are something to get excited about. BYOD users also tend to be more careful with their devices just because they are their own devices. Likewise, they’re more on point with repairs or replacements and are keen to handle those issues on their own. Security is ever evolving Security has always beena major concern when it comes to BYOD, and the threats will always be evolving. The biggest concerns stem from user behavior, with users losing devices being one big concern. Verizon reports that more than 90% of security incidents involving lost or stolen devices resulted in an unauthorized data breach, and 42% involved the leaking of internal data. Another big concern is users falling prey to malicious actors: falling for phishing schemes, downloading malware, allowing corporate data to be placed in public spaces, or letting others use their devices. Devices themselves can be major targets, with attacks coming from different directions like public Wi-Fi, malicious apps or apps that are not designed to safeguard data properly, OS and network vulnerabilities, and so on. Supporting infrastructure can also be a weak point. These threats are real. Research by JumpCloud indicates that 20% of businesses have seen malware as a result of unmanaged devices, and nearly half aren’t able to tell if unmanaged devices have compromised their security. Cybersecurity Insiders research shows a similar statistic of 22%, while also noting that 22% of BYOD devices have connected to malicious wireless networks. Shadow IT will always exist Shadow IT is a phenomenon that has existed for decades but grew rapidly alongside BYOD, when users began leveraging their personal devices, apps, and services for work without IT’s involvement, knowledge, or consent. Almost every company has some degree of shadow IT, and thus unmanaged devices or other technologies. Organizations need to educate usersabout security and keeping their devices safe. They also need to engage users involved in shadow IT and make allies out of them, because shadow IT often stems from unmet technological needs. Then there’s the trust component. Many users remain uncomfortable letting IT manage their devices, because they don’t understand what IT will be able to see on them. This is a user education problem that all companies need to address clearly and unequivocally. Still the same goals Although much has changed about BYOD, the basic goal remains the same: allowing workers to use the devices and other tools they are comfortable with and already own… and are likely to use whether sanctioned to or not. #byod #like #its
    WWW.COMPUTERWORLD.COM
    BYOD like it’s 2025
    Hard as it is to believe, there was a time when using any personal technology at work was such a radical concept that most people wouldn’t even consider it an option. IT departments went to great lengths to prevent workers from using their own devices, computers, apps/subscriptions, email, and cloud services. The release of the iPhone in 2007 began to change that. Suddenly people were discovering that the smartphone they bought for their personal use could make them more efficient and productive at work as well. But it was Apple’s launch of its mobile device management framework in 2010 that truly created the bring your own device movement. MDM meant that users could bring their personal devices to work, and IT departments could secure those devices as needed. Almost instantly, BYOD was something that companies began to support in industries across the board. Fifteen years later, BYOD is fully mainstream, and a majority of businesses actively support it. But advances in technology, changing user expectations, and the fallout from Covid’s remote work mandates (and subsequent return to office mandates) have shifted the landscape, sometimes without being overtly visible. With that in mind, I decided to reexamine the assumptions and realities of BYOD and see what has and hasn’t changed in the past decade and a half. BYOD is everywhere but device management isn’t The exact numbers on BYOD adoption vary depending on the source you look to and how it’s being measured. A 2022 paper from HPE claims that 90% of employees use a mix of work and personal devices on the job, while Cybersecurity Insiders says that 82% of organizations have a BYOD program. However you look at it, BYOD is now massively entrenched in our work culture and extends beyond just employees and managers. According to data from Samsung (cited by JumpCloud), 61% of organizations support BYOD for non-employees including contractors, partners, and suppliers to varying degrees. But overtly or tacitly accepting BYOD doesn’t mean that companies actively manage BYOD devices. Cybersecurity Insiders data (also via JumpCloud) also indicates that as many as 70% of BYOD devices used in the workplace aren’t managed — a number that may seem shocking, but that figure includes personal devices used by non-employees such as contractors. About those cost savings… In the early days, there was an assumption that BYOD would lower hardware and service costs, but that wasn’t certain. Today there’s data. In the early 2010s, Cisco estimated a $900+ annual savings per employee, though more recent data from Samsung (cited by JumpCloud) pegs the savings as significantly lower at $341. Despite that disparity, it’s obvious that there are savings to be had, and with significantly climbing smartphone prices, those savings are is poised to grow rather than shrink. Of course, the cost of managing devices needs to be factored in. That cost can vary widely depending on the vendor, specific products, and adopted features, but some MDM vendors charge as little as $1 per user per month (not including staff resources). The cost of providing employees company-purchased apps is also worth noting, though that falls more in line with traditional software procurement. Productivity gains are real, but so are distractions The data is clear that there can be significant gains in productivity attached to BYOD. Samsung estimates that workers using their own devices can gain about an hour of productive worktime per day and Cybersecurity Insiders says that 68% of businesses see some degree of productivity increases. Although the gains are significant, personal devices can also distract workers more than company-owned devices, with personal notifications, social media accounts, news, and games being the major time-sink culprits. This has the potential to be a real issue, as these apps can become addictive and their use compulsive. Tools of the trade When I think back to the first five to ten years after Apple introduced MDM, it reminds me of the later stages of the birth of the solar system, with dozens of companies offering discrete tools that solved part of the mobility and BYOD puzzle, many colliding into each other or being flung out of existence. Some focused on just supporting the MDM server spec sheet, others on cloud storage, securing and managing access to corporate content, corporate app purchasing and management, secure connectivity, user and identity management, Office alternatives (Microsoft waited nearly five years releasing an iOS version of Office), and more. Along the way, major enterprise vendors began dominating the market, some by acquisition and others by building out existing capabilities, although there were also businesses that came out of mergers of some of the new players as well. As the market matured, it became easy to pick a single vendor to provide all enterprise mobility and BYOD needs rather than relying on multiple companies focusing on one particular requirement. Multiplatform support has morphed into something very different The iPhone was the clear early standard for supporting personal devices at work, in part because the hardware, operating system, and MDM mechanics were all created by a single vendor. Going multiplatform was typically assumed to mean iOS and Android — and Android was a fragmented mess of different hardware makers with sometimes widely varying devices and customized Android variants (built to spec by the manufacturers and the demands of wireless carriers) that resulted in no coherent OS update strategy. The gap in management capabilities has narrowed significantly since then, with Google taking a much more active role in courting and supporting enterprise customers and providing a clear and coherent enterprise strategy across a wide swath of major Android phone makers and other vendors. But that isn’t the only massive shift in what it means to be multiplatform. Today the personal devices used in the workplace (and able to be managed using MDM) include non-phone entries including Macs, Apple TVs, Chromebooks, and Windows PCs — with Macs and PCs making up a significant number of BYOD devices. Most MDM suites support this full range of devices to one degree or another, but support costs can rise as more and more platforms (and thus complexity) are implemented — and those costs vary by platform, with general agreement that Apple devices provide the greatest savings when it comes to technical support. How Covid changed the BYOD equation I’m pretty sure that in 2010, not one person on the planet was predicting a global pandemic that would lead to the vast majority of knowledge workers working from home within a decade. Yet, as we all remember, that’s exactly what happened. The need to work from home encouraged broader adoption of personal devices as well as ancillary technologies ranging from peripherals/accessories to connectivity. Despite a litany of return-to-office mandates in recent years, remote work is here to stay, whether that’s full-time, hybrid, or just working outside traditional office hours or location. Samsung notes that 61% of businesses expect employees to work remotely to some degree, while Robert Half reports that only 61% of new job postings in 2024 had full in-office requirements. And data from WFH Research shows that at the start of 2025, employees are working remotely 28% of the time. Passing support to new generations One challenge for BYOD has always been user support and education. With two generations of digital natives now comprsing more than half the workforce, support and education needs have changed. Both millennials and Gen Z have grown up with the internet and mobile devices, which makes them more comfortable making technology decisions and troubleshooting problems than baby boomers and Gen X. This doesn’t mean that they don’t need tech support, but they do tend to need less hand-holding and don’t instinctively reach for the phone to access that support. Thus, there’s an ongoing shift to self-support resources and other, less time-intensive, models with text chat being the most common — be it with a person or a bot. They also have different expectations in areas like privacy, processes and policies, and work-life balance. Those expectations make it more important for companies to delineate their BYOD and other tech policies as well as to explain the rationale for them. This means that user education remains important, particularly in a rapidly changing landscape. It also means that policies should be communicated in more concise and easily digestible forms than large monolithic pages of legalese. Users actually want to update (and repair or replace) their devices Twenty years ago, the idea of updating workplace technology was typically met with a groan from users who didn’t appreciate downtime or changes in the way things looked and worked. Even as BYOD gained traction, getting users to update their devices wasn’t always easy and required a certain amount of prompting or policing. While resistance to change will never truly die out, most smartphone (and other device) users actively update on their own because of the new features that come with OS updates and new hardware. Upgrades are something to get excited about. BYOD users also tend to be more careful with their devices just because they are their own devices. Likewise, they’re more on point with repairs or replacements and are keen to handle those issues on their own. Security is ever evolving Security has always been (and always will be) a major concern when it comes to BYOD, and the threats will always be evolving. The biggest concerns stem from user behavior, with users losing devices being one big concern. Verizon reports that more than 90% of security incidents involving lost or stolen devices resulted in an unauthorized data breach, and 42% involved the leaking of internal data. Another big concern is users falling prey to malicious actors: falling for phishing schemes, downloading malware, allowing corporate data to be placed in public spaces, or letting others use their devices. Devices themselves can be major targets, with attacks coming from different directions like public Wi-Fi, malicious apps or apps that are not designed to safeguard data properly, OS and network vulnerabilities, and so on. Supporting infrastructure can also be a weak point. These threats are real. Research by JumpCloud indicates that 20% of businesses have seen malware as a result of unmanaged devices, and nearly half aren’t able to tell if unmanaged devices have compromised their security. Cybersecurity Insiders research shows a similar statistic of 22%, while also noting that 22% of BYOD devices have connected to malicious wireless networks. Shadow IT will always exist Shadow IT is a phenomenon that has existed for decades but grew rapidly alongside BYOD, when users began leveraging their personal devices, apps, and services for work without IT’s involvement, knowledge, or consent. Almost every company has some degree of shadow IT, and thus unmanaged devices or other technologies. Organizations need to educate users (even digital natives) about security and keeping their devices safe. They also need to engage users involved in shadow IT and make allies out of them, because shadow IT often stems from unmet technological needs. Then there’s the trust component. Many users remain uncomfortable letting IT manage their devices, because they don’t understand what IT will be able to see on them. This is a user education problem that all companies need to address clearly and unequivocally. Still the same goals Although much has changed about BYOD, the basic goal remains the same: allowing workers to use the devices and other tools they are comfortable with and already own… and are likely to use whether sanctioned to or not.
    0 Комментарии 0 Поделились 0 предпросмотр
CGShares https://cgshares.com