","alternateLabel":null,"teaserImage":{"id":1506,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/2013-Rest-Tech-Teaser.jpg?itok=DWr0ZNpD","width":100,"alt":null,"height":134},"sponsored":false,"businessTopic":[],"company":[],"contentType":[]},{"title":"Hotel Enhances Luxury Brand with In-room iPads Without Sacrificing Guest Privacy","id":3452,"bundle":"article","summary":"The SLS Hotel in South Beach offers its high-end guests the luxury of in-room iPads, but safeguards the private information of guests with the help of AirWatch mobile device management.","showSummary":null,"url":"/hotel-enhances-luxury-brand-room-ipads-without-sacrificing-guest-privacy","date":"2013-02-14T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":22487,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/sls2.jpg?itok=RfVEmbjz","width":122,"height":216,"alt":null},"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Lodging","url":"/lodging"},{"name":"Hotel Management","url":"/hotel-management"},{"name":"Hotel Brand -- Business Class","url":"/hotel-brand-business-class"},{"name":"Hotel Brand -- Economy Class","url":"/hotel-brand-economy-class"},{"name":"Hotel Brand -- Major","url":"/hotel-brand-major"},{"name":"Hotel Brand - Luxury/Resort","url":"/hotel-brand-luxuryresort"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Hotel Brand -- Boutique/Lifestyle","url":"/hotel-brand-boutiquelifestyle"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"2013 Industry Outlook ","id":3460,"bundle":"article","summary":"HT's Editorial Advisory Board, comprised of hospitality executives from a diverse mix of industry segments, offers their insights into what challenges and opportunities are emerging in technology for 2013.","showSummary":null,"url":"/2013-industry-outlook","date":"2013-02-13T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":22481,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/htjanfeb13_cover.jpg?itok=3VNxezhy","width":130,"height":175,"alt":null},"topics":[{"name":"Data & Analytics","url":"/data-analytics"},{"name":"Cloud Computing","url":"/cloud-computing"},{"name":"Customer Relationship Management (CRM)","url":"/customer-relationship-management-crm"},{"name":"Security -- Network","url":"/security-network"},{"name":"Guestroom / In-room","url":"/guestroom-room"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Loyalty","url":"/loyalty"},{"name":"Mobile Point of Sale (POS)","url":"/mobile-point-sale-pos"},{"name":"Near-Field Communications","url":"/near-field-communications"},{"name":"Online Ordering","url":"/online-ordering"},{"name":"Payment Security","url":"/payment-security"},{"name":"POS","url":"/pos"},{"name":"Property Management Systems","url":"/property-management-systems"},{"name":"Social Networking","url":"/social-networking"},{"name":"Software","url":"/software"},{"name":"Televisions","url":"/televisions"},{"name":"Website Design","url":"/website-design"},{"name":"Restaurants","url":"/restaurants"},{"name":"Lodging","url":"/lodging"},{"name":"Cover Story","url":"/cover-story"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Steps to Create an Effective BYOD Management Plan","id":8692,"bundle":"blog","summary":"With Bring Your Own Device (BYOD) emerging as an option for mobile workplaces, the hospitality space today is facing a rash of security risks. VP of technology for Stout Street Hospitality, Jeffrey Stephen Parker, offers some best practices for operators looking to implement a BYOD policy.","url":"/steps-create-effective-byod-management-plan","byline":"Jeffrey Stephen Parker, CHTP, VP of Technology, Stout Street Hospitality/Magnolia Hotels","sponsored":false,"blogSeries":{"url":"/vantage-point-blog","title":"Vantage Point","icon":{"url":"https://assets1.hospitalitytech.com/styles/thumbnail/s3/2021-03/Blog_default4.png?itok=YzhquaJ9","id":4451,"alt":"weapon,drawing","width":90,"height":92},"author":{"email":"jay@ashday.com","uname":"jkerschner","firstName":"Ashday","lastName":"Developer","bio":null,"title":null,"picture":null,"phone":null,"contactForm":false},"iconBackground":"#00949C"},"author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"date":"2013-02-13T00:00:00","digitalEdition":null,"hideByline":null,"teaserImage":{"id":9254,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/jeff-parker-8x10%4072_0.jpg?itok=nn2btViZ","width":200,"alt":null,"height":250},"topics":[{"name":"Cloud Computing","url":"/cloud-computing"},{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Lodging","url":"/lodging"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Demand for Technology Continues, but IT Executives Cautious About 2013","id":3483,"bundle":"article","summary":"IT Industry Outlook report from CompTIA reveals that cloud, big data and mobility are top of tech wish lists, but are countered by economic concerns.","showSummary":null,"url":"/demand-technology-continues-it-executives-cautious-about-2013","date":"2013-01-31T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Cloud Computing","url":"/cloud-computing"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Mobile Payments","url":"/mobile-payments"},{"name":"Mobile Point of Sale (POS)","url":"/mobile-point-sale-pos"},{"name":"Restaurants","url":"/restaurants"},{"name":"Lodging","url":"/lodging"},{"name":"Data & Analytics","url":"/data-analytics"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Genghis Grill Protects Brand and Data with PCI Provider ","id":3491,"bundle":"article","summary":"Genghis Grill selects ANX as its endorsed data security and compliance provider to protect customer data from cyber criminals.","showSummary":null,"url":"/genghis-grill-protects-brand-and-data-pci-provider","date":"2013-01-28T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Payment Security","url":"/payment-security"},{"name":"Restaurants","url":"/restaurants"},{"name":"Family Casual Dining","url":"/family-casual-dining"},{"name":"Fast Casual Dining","url":"/fast-casual-dining"},{"name":"Quick Service Restaurant (QSR)","url":"/quick-service-restaurant-qsr"},{"name":"Mobile Device Security","url":"/mobile-device-security"}],"attachedFiles":[]},{"title":"Eight Trends Changing Network Security","id":3492,"bundle":"article","summary":"As hospitality sees ever faster network connections, more remote users, and extensive upgrades to mobile networks, it's increasingly important to think about security policies and where and how to provide protection.","showSummary":null,"url":"/eight-trends-changing-network-security","date":"2013-01-28T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":22476,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/network-security12813.jpg?itok=_Ki31RYB","width":216,"height":143,"alt":null},"topics":[{"name":"Cloud Computing","url":"/cloud-computing"},{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Restaurants","url":"/restaurants"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]},{"title":"Customer Knows Best: Restaurant Listens to Demands for Mobile Pay and Sees ROI ","id":3557,"bundle":"article","summary":"The Dogwood in Austin saw sales and loyalty soar after implementing a mobile payment option.","showSummary":null,"url":"/customer-knows-best-restaurant-listens-demands-mobile-pay-and-sees-roi","date":"2012-12-20T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":{"id":22466,"url":"https://assets1.hospitalitytech.com/styles/secondary_articles_short/s3/dogwoodaustin.jpg?itok=cYsvqDFN","width":216,"height":149,"alt":null},"topics":[{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Mobile Payments","url":"/mobile-payments"},{"name":"Mobile Devices & Apps","url":"/mobile-devices-apps"},{"name":"Mobile Point of Sale (POS)","url":"/mobile-point-sale-pos"},{"name":"POS","url":"/pos"},{"name":"Payment Security","url":"/payment-security"},{"name":"Restaurants","url":"/restaurants"},{"name":"Family Casual Dining","url":"/family-casual-dining"},{"name":"Fast Casual Dining","url":"/fast-casual-dining"},{"name":"Fine Dining","url":"/fine-dining"}],"attachedFiles":[]},{"title":"Report Highlights Security Threats to Business, Digital Lifestyle, and Cloud","id":3564,"bundle":"article","summary":"Security predictions for 2013 and beyond are included in report from Trend Micro.","showSummary":null,"url":"/report-highlights-security-threats-business-digital-lifestyle-and-cloud","date":"2012-12-18T00:00:00","author":{"email":"devteam@ashday.com","uname":"ht_root","firstName":null,"lastName":null,"bio":null,"title":null,"picture":null,"phone":null,"contactForm":null},"digitalEdition":null,"sponsored":false,"taggedPro":null,"teaserImage":null,"topics":[{"name":"Security -- Network","url":"/security-network"},{"name":"Mobile Device Security","url":"/mobile-device-security"},{"name":"Payment Security","url":"/payment-security"},{"name":"Security -- Physical","url":"/security-physical"},{"name":"Restaurants","url":"/restaurants"},{"name":"Lodging","url":"/lodging"},{"name":"Hotels","url":"/hotels"}],"attachedFiles":[]}]},"title":"Mobile Device Security","contentParagraphs":null,"sections":null};
const country = "US";
const language = null;
const SITE_LANGUAGE = "en";
const siteName = "Hospitality Technology";
const userRoles = ["anonymous"];
const userUid = 0;
const indexName = "HT";
const title = "Mobile Device Security | Hospitality Technology";
window.dataLayer = window.dataLayer || [];
const data = {};
data.entityTaxonomy = {};
const contentTypes = [
"article",
"blog",
"bulletin",
"embed_page",
"landing_page",
"event",
"image",
"page",
"product",
"whitepaper",
"video",
"tags",
"author_profile",
"buyers_guide_listing"
];
if (
routeInfo &&
"bundle" in routeInfo &&
contentTypes.includes(routeInfo["bundle"])
) {
data.entityBundle = routeInfo.bundle;
data.entityTitle = title || `${routeInfo.title} | ${siteName}`;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.entityType = "node";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.entityTaxonomyKeys = {};
data.entityTaxonomyHierarchies = {};
data.parentNaicsCode = {};
data.isPro = false;
data.algoliaIndexName = indexName;
// Add taxonomy data
const taxonomies = {
businessTopic: "business_topic",
contentType: "content_type",
company: "company",
marketSegment: "market_segment",
};
const getHierarchy = (term, terms = []) => {
terms.push({ id: term.id, name: term.name });
if (term.parentTerm != null) {
getHierarchy(term.parentTerm, terms);
}
return terms;
};
const getTerms = (term, useApiId = false) => {
return { id: useApiId ? term.apiId : term.id, name: term.name };
};
const getKeys = (term) => {
return { id: term.id, name: term.apiId };
};
Object.entries(taxonomies).forEach(([key, item]) => {
terms = routeInfo[key];
if (terms && terms.length > 0) {
data["entityTaxonomy"][item] = terms.map((term) =>
getTerms(term, key === "company")
);
if (key !== "company") {
data["entityTaxonomyKeys"][item] = terms.map(getKeys);
termGroups = [];
terms.forEach((term, termInd) => {
termGroups[termInd] = getHierarchy(term);
});
data["entityTaxonomyHierarchies"][item] = termGroups;
}
}
});
data["entityTaxonomy"]["tags"] = routeInfo["topics"] || [];
// Primary Topic is either the business topic or the top tag.
if (routeInfo["businessTopic"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["businessTopic"][0]["name"];
} else {
if (routeInfo["topics"]?.length > 0) {
data["entityPrimaryTopic"] = routeInfo["topics"][0]["name"];
}
}
// Primary and secondary entityNaicsCodes come from the MarketSegment
if (routeInfo.marketSegment?.length > 0) {
data.entityNaicsCode = {};
data["entityNaicsCode"]["id"] = routeInfo["marketSegment"][0]["id"];
data["entityNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["naicsCode"];
if (routeInfo["marketSegment"][0]["parentTerm"] != null) {
data["parentNaicsCode"]["id"] =
routeInfo["marketSegment"][0]["parentTerm"]["id"];
data["parentNaicsCode"]["name"] =
routeInfo["marketSegment"][0]["parentTerm"]["naicsCode"];
}
} else {
data.entityNaicsCode = [];
}
if (routeInfo.taggedPro) {
data.isPro = routeInfo.taggedPro;
}
window.dataLayer.push(data);
} else if (routeInfo && "vid" in routeInfo) {
data.entityBundle = "tags";
data.entityTitle = routeInfo.name;
data.entityId = routeInfo.id;
data.entityName = routeInfo.author?.uname;
data.entityCreated = routeInfo.created;
data.entityType = "taxonomy_term";
data.entityLangcode = SITE_LANGUAGE;
data.siteName = siteName;
data.sponsored = routeInfo.sponsored;
data.sponsor = routeInfo.sponsoringCompany;
data.drupalLanguage = language;
data.drupalCountry = country;
data.userRoles = userRoles;
data.userUid = userUid;
data.algoliaIndexName = indexName;
data["entityTaxonomy"]["tags"] = {
id: routeInfo["id"],
name: routeInfo["name"],
};
window.dataLayer.push(data);
}
})();
Mobile Device Security | Hospitality Technology
Skip to main content 2013 Industry Outlook HT's Editorial Advisory Board, comprised of hospitality executives from a diverse mix of industry segments, offers their insights into what challenges and opportunities are emerging in technology for 2013.
Steps to Create an Effective BYOD Management Plan With Bring Your Own Device (BYOD) emerging as an option for mobile workplaces, the hospitality space today is facing a rash of security risks. VP of technology for Stout Street Hospitality, Jeffrey Stephen Parker, offers some best practices for operators looking to implement a BYOD policy.
Eight Trends Changing Network Security As hospitality sees ever faster network connections, more remote users, and extensive upgrades to mobile networks, it's increasingly important to think about security policies and where and how to provide protection.
X
This ad will auto-close in 10 seconds