Mobile Device Management

BYOD Dos and Dont's Report

Issue link:

Contents of this Issue


Page 11 of 14

12 12 APPLICATIONS There are some apps that every employee should have. Others must be banned. Applica on filtering with white lists and blacklists can control access to apps based on the device and opera ng system. Enterprises may want an applica on store for in-house custom apps and preferred apps; this can address delays in Apple and Google's approval processes. There may also be reasons to avoid releasing an app in a public app store that compe tors can view. MDM support for installing custom apps and establishing a company app store experience may be another important considera on. POLICY ENFORCEMENT Before managers update their mobile policies, it is necessary to learn the ways which employees at different loca ons or divisions are circumven ng the program. An enforceable policy can help secure corporate data on personal devices. This may require a policy to lock devices a er several failed a empts at a password and a "kill switch" that can remotely wipe the data if a device is lost. Some MDM solu ons provide data monitoring capabili es that report on what data is moving to and from the device. Loca on capabili es with "Geofencing," can detect when devices leave certain geographic areas and take ac on to secure them (such as locking or remotely wiping data on the device). In some cases, employers may wish to lock a camera when employees are in the office or other loca ons and release it for personal use when they are home. It should be noted that privacy laws add complexity for firms in some countries with laws that prohibit loca on tracking and use of these features. NEXT STEPS • Decide how many forms of BYOD you will support. • Determine the device scope. • Will the BYOD program support tablets, smartphones, PCs, applica ons or a combina on of these items? • Will the BYOD program apply only to a secondary device, or is it for users' primary devices? • Consider the benefits of suppor ng a mix or hybrid model of enterprise or corporate liable and BYOD. • Determine when, how, and how much you will subsidize business use of personal devices. • Working with HR, your legal department and your corporate risk organiza on, understand how tax, privacy, legal liability and labor rela ons impact the program. • Determine who qualifies for a usage subsidy and how it will be paid (allowance, s pend, voucher or reimbursement program). SECURITY Like PCs, smartphones and tablets and the data that resides on those devices must be protected. There are several areas of vulnerability. First there is vulnerability from the physical loss of equipment, when an employee leaves it somewhere or it is stolen. The second security risk includes spyware, malware and viruses. This can result in a network of devices programmed for malicious ac vity such as stealing data (customer credit cards, pa ent records, etc.) or crashing a corporate network. Device manufacturers support encryp on, but the encryp on levels vary. Some MDM providers have the ability to encrypt specific files, folders or company data. Also, providers can now place corporate data and applica ons in a secure environment or sandbox. Par oning allows employees to separate work and personal items. Some MDM providers offer browser security. Mobile web browsing can be filtered to lower the risk of a ack on a device. Web filtering tools can block access to poten ally dangerous or non-work-related websites. Intrusion- preven on so ware tools can block network access for noncompliant devices. In addi on, some security now helps screen devices for malicious apps

Articles in this issue

Links on this page

Archives of this issue

view archives of Mobile Device Management - BYOD Dos and Dont's Report