banner



So, you want to adopt BYOD?

Lumia 920 company apps

Bring Your Own Device (BYOD) is the current hot trend. (And has been for a while, really.) There are many perceived advantages for a company that allows employees to bring their ain devices to work and have access to your company resource, but is BYOD right for yous? Tin you make mistakes when developing your BYOD policies? Can yous really let any device connect to your resources?

Lets look at a few top issues that yous should be aware of.

What devices should your BYOD policy include?

BYOD used to mean Bring Your Own (Smartphone or Tablet) Device. The BYOD movement started through the failure of BlackBerry to keep upwardly with Apple and Google every bit they began to dominate and revolutionize the mobile landscape with more capable devices that had much faster CPUs, more memory, larger screens, and desktop web browsing capabilities.

BYOD has now morphed into Bring Your Own (Smartphone, Tablet, or Laptop) Device. But what devices practice you want your BYOD policy to include? Practise you want to limit information technology to smartphones and tablets, or exercise you want to include laptops?

iPhone and BlackBerry Q10

Which smartphones and tablets should you lot allow?

Today the marketplace is brimful with smartphone and tablet choices from Apple, Google, Nokia, Microsoft, Samsung, HTC, Motorola, LG, and even Amazon — to name but a few manufacturers. If you adopt a BYOD policy that includes smartphones and tablets, can you really allow your employees to bring in whatsoever device they want, and await that the device is secure enough?

The reply is no, non all mobile devices can be secured to the same level. (Nor should you ever assume an employee's home device is safety.)

Apple leads in the enterprise considering it has built strong and flexible APIs since 2022 (starting with iOS 4.0) that allow Mobile Device Management (MDM) vendors to tightly secure, control, restrict, and monitor iOS devices. Those controls have improved profoundly with iOS 7. Google'southward Android mobile operating system is not as popular in enterprise because Android does not provide many built-in controls and is perceived as insecure — even though that isn't actually the case.

Vendors like Samsung have made radical additions to Android to endeavour and brand information technology more secure. For example, some Samsung devices support Samsung Approved For The Enterprise (SAFE) and Samsung Knox that allow similar kinds of controls as what is found in iOS. Windows Phone and Windows RT tablets presently lack the kind of secure compartimentalization that is bachelor on iOS and Samsung devices.

So as yous think nigh which devices you should allow, you lot need to consider how each can be secured. You can either limit the device choice to iOS and a limited choice of Android and Windows Phone/Windows RT devices, or you could use a method of device security called Containerization that we talk over in its own section below.

Laptop

Will you allow laptops?

If y'all permit your employees to bring their personal laptops, which ones will you allow, and how will you ensure that they are secure? Some MDM vendors do offering laptop direction, only you may choose to utilise virtual machines instead. Virtual machines allow you to create a "company secure build" of Windows, and have that virtual motorcar run on personal Windows, Mac OSX, and Linux laptops.

Mobile Device Management (MDM) or Containerization?

The traditional method of securing smartphone and tablet devices is to utilise MDM. This allows the It staff to have full control over the entire mobile device if they make up one's mind to, or simply control the company information and apps.

Your employees may not capeesh that you lot have full control over their mobile devices, even if you take chosen non to practice that that power. Your employees may prefer that you lot simply have control over part of their device, leaving their personal data solitary.

Containerization (besides known as Dual Persona) is the solution for ii issues. The start upshot is that of providing that same security policy beyond all Smartphones and Tablets no matter what operating system they are running. The second upshot is that of personal and company separation.

By keeping your visitor electronic mail, contacts, calendar, and apps in a separate, secure, encrypted container on the Smartphone and/or Tablet, yous have no way of having visibility into their personal device, apps, and data. You are limited to decision-making only the container. Dual Persona is increasingly becoming the go-to choice for BYOD since it provides peace of mind, and truly separates personal and company information.

iPhone secure workspace

Bring Your Ain App (BYOA)

BYOA is a movement that leverages the popularity of containerization, but to the app level. The idea is that you lot take your company's apps and wrap them in a secure container, and push them to your employees' personal devices. You lot merely accept control over the app in the container, and not entire parts of the device. The app is secured in its container, and may take access to data behind your firewall via a secure connection from the container.

This truly separates corporate and personal data at the app level.

Monthly phonation and data costs

When you allow your employees to use their own devices, you should consider whether you lot want to compensate them in some way. Practice you want to take the approach that since they would be paying for voice and data anyway, that you do non need to provide a monthly stipend. Some employees may fence that they pay for the vocalism minutes and data usage based on their personal apply, and do not have unlimited data plans. In this situation, they could argue that their voice and data usage will increase when they first accessing company resources.

You need to decide whether to offer a monthly voice and/or data stipend, and how much to offer.

If employees need to travel internationally for piece of work, how will you handle international phonation and data rates?

Back up costs

When yous adopt a BYOD policy, you will need to decide whether you lot want to provide back up for your employees, and how much support. Your employees may be bringing devices running multiple mobile operating systems (and in the case of Android, many variants of that operating system).

What type of support will you be offering through your assist desk? How will you finer railroad train your support staff to bargain with the device variety, and will yous need to hire more people to provide that support?

HTC One accounts

How do your current laptop security policies translate to mobile?

Nigh companies already have well established security policies that they apply to company provided laptops. These include password policies, hard deejay encryption, 2 cistron hallmark, express web browsing, and blocking of eternal storage to name a few.

While your may desire to merely use those aforementioned policies on smartphones and tablets that access your resource, it may non be practical to practice and so. Some policies that piece of work on laptops, may not interpret to mobile, and policies that do interpret may be likewise invasive or limiting. Plan on using a subset of your current end-point polices for mobile.

Nobody ever said BYOD would be like shooting fish in a barrel

Every bit y'all can run across, creating a BYOD policy encompasses many unlike areas, and there are many decisions to exist made so that your BYOD policy does not fail. Making it too restrictive or intrusive could atomic number 82 to rebellion by your employees. Making it likewise relaxed could lead to exposed company data or information leakage. Not accounting for all variable could actually lead to an increase in price, instead of the decrease you were hoping for.

BYOD has benefits and detractions that yous need to counterbalance when because implementing information technology for your business organisation. But washed right and the benefits can far outweigh the costs.

Source: https://www.windowscentral.com/so-you-want-adopt-byod

Posted by: rosswhicenty.blogspot.com

0 Response to "So, you want to adopt BYOD?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel