Mobile Device Management

BYOD Dos and Dont's Report

Issue link:

Contents of this Issue


Page 12 of 14

13 GOING FORWARD Where does your company stand on BYOD today? If you do not define a BYOD policy, employees will bring their personal devices and applica ons to work. A SANS Ins tute IT Survey iden fied that 91% of respondents were not fully aware of mobile devices on their network. Tools are necessary to ensure that employees do not bypass official corporate policy and use "shadow" technology that has not been approved. Mobile devices and PCs are o en considered together for BYOD considera ons, but the challenges they bring and how they are used are quite different. PCs can func on as stand-alone devices that are not networked, while mobile devices are part of a dynamic, real- me collabora ve ecosystem. Nearly all of their value comes from connec vity. With the flood of new smartphones and tablets coming to market and short lifecycles of 12 to 18 months, implemen ng BYOD is not a one- me job. Each new product needs to be tested to determine its security risks. Managers must define their security controls, management controls, provisioning, de-provisioning and the re rement process. It is easy to get distracted in reviewing new offerings and other func onality. Determine what problems or needs you need to solve. Keep those cool, interes ng capabili es in mind, but begin with your specific users and their challenges. New features and offerings may solve different needs and goals for other users, but they may also present new problems. Remember to invest in a sustainable user-centric approach. Balance strategic objec ves and the experience you seek for employees. Also, consider the poten al economic impact (both posi ve and nega ve) in adop ng a BYOD policy. Consider the use case and how employees will use different devices, data and apps. As TEMIA's survey found, most organiza ons are using a hybrid model for individual liable and corporate liable rather than an all or nothing approach. Managers should also be sure to factor all the costs to support mul ple pla orms. Placing limits on the number of devices and applica ons that employees can use will help limit the security risks and costs of the program. This is where a CYOD program that limits the number of approved devices and pla orms may be more realis c compared to an unlimited BYOD program that allows employees to bring any device to work.

Articles in this issue

Links on this page

Archives of this issue

view archives of Mobile Device Management - BYOD Dos and Dont's Report