Tuesday, June 18, 2013

The hype of BYO Device is on every CIOs mind right now, don't take it lightly

BYOD strategy and mobile device security remain a top IT priority

Employee-owned smartphone use for work purposes continues to expand, and the governance, risk and compliance implications of the trend are beginning to take hold. According to a recent survey by Search Compliance, "security" was cited by 96% of respondents as being among their top concerns regarding bring your own device (BYOD)/consumerisation of IT.

"Compliance" was the second-ranked top BYOD/ consumerisation concern in the survey, taken by 773 IT professionals during Search Compliance's April 24 virtual conference, The State of Cyber Security 2013.

Do you provide a BYOD strategy or not?

Many businesses either put their heads in the sand or sit on the fence…

Managing mobility in the enterprise is a relatively new and rapidly transforming business discipline. Enterprise mobile management (EMM) is an emerging holistic approach that incorporates and transcends mobile device management (MDM), mobile app management (MAM) and other software for managing mobile assets. The shift is away from merely managing the assets themselves and toward transforming business through mobilizing the enterprise. Mobile management began by focusing on MDM, but subsequently expanded to include application management, as enterprises realized that managing only the devices themselves was not enough. While MDM helps address authentication and security, success with mobility also depends on apps that are lightweight, secure and easy to manage, distribute and use.

A Growing Focus is now on Content

A growing trend is the shift toward being able to manage mobile content as well as mobile apps. Given the huge growth we expect as tablets become more widely used in enterprises is the need to manage content that is part of a mobile worker’s job. Mobile security is a top priority in gaining managed control over smartphones and tablets in business, whether the devices are company-owned or BYOD. Content stored on those devices is a critical exposure, and protecting the intellectual property of the business demands a mobile content strategy. Although newer smartphones with modern OSs have device-level encryption to protect content, significantly more is needed to protect sensitive documents and valuable corporate intellectual property.

Enterprise Mobility: The Business Imperative

For enterprises, the multiple elements of mobile and mobile management are rapidly becoming part of the strategic business foundation. Managing mobile devices and controlling BYOD have been important priorities behind the MDM segment, but increasingly a holistic approach to mobility is required. As enterprises make mobile an integral part of how their systems are designed and how their business runs, mobile management that addresses mobile devices, the mobile app lifecycle, and mobile content in an integrated way becomes a priority.

BYOD isn’t a synonym for “free for all.” Once an organization decides to let employees use their own mobile devices and PCs for work, it must put a BYOD policy in place to control this usage.
The details of any bring your own device (BYOD) policy will be specific to a given organization, but most policies cover the same basic questions:
  • ·         How should users protect their devices?
  • ·         What data and applications can and can’t be accessed?
  • ·         And what happens when a user loses a device or leaves the company?

BYOD can be confusing, because it involves different kinds of devices, use cases and users. To create a clear and simple BYOD policy, IT and other business decision-makers should consider the following issues:-

Acceptable use

First and foremost, it’s vital to specify which functions a given user can access, and what general behaviours are acceptable. It’s important to protect the organization from users who may have, for example, illicit materials on their devices, or information that may be proprietary to another firm.

Device selection

It’s probably not reasonable today, because of support costs and the sheer number of devices available, to allow any arbitrary smartphone or tablet on the enterprise network. A relatively broad range of platforms -- for example, Android, iPhone and BlackBerry -- is usually sufficient.


Some BYOD corporate strategies will pay for users’ devices and monthly services, either partially or in full. A BYOD policy should explain exactly what charges the organization will and won’t reimburse. Third-party services and software can provide detailed accounting of phone (and sometimes data) usage, but it may be easier to simply reimburse a pre-specified percentage of users’ monthly bills. Your organization may need to modify its accounting systems to support this critical function.

Applications and security

Whitelisting and blacklisting apps is a popular technique that, while certainly not fool proof, helps to maintain the security and integrity of enterprise IT resources (to say nothing of the handset itself). If your organization takes this approach, the BYOD policy should explain that IT has the authority to prohibit the use of certain apps. The overall software configuration of the handset is a key variable in successful mobile IT operations, so the BYOD policy should also cover the use of antivirus apps, other security software and firewall settings.
“New mobile technology and new user models requires a new breed of management -- that's what you should be thinking about as you move forward.”
And for the Marketing:  If you want someone to come in and remove all the vendor marketing hype reach out to CCServe Ltd and have a chat.

1 comment:

  1. I would like to thank you for the efforts you have put in writing this site. I am hoping the same high-grade website post from you in the upcoming as well. In fact your creative writing skills has inspired me to get my own site now. Really the blogging is spreading its wings quickly. Your write up is a good example of it.