• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
BYOD: Bring Your Own Device Implementation and Security Issues
 

BYOD: Bring Your Own Device Implementation and Security Issues

on

  • 272 views

This presentation describes the simple concept behind the emerging technology trend that is BYOD.

This presentation describes the simple concept behind the emerging technology trend that is BYOD.

Statistics

Views

Total Views
272
Views on SlideShare
272
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    BYOD: Bring Your Own Device Implementation and Security Issues BYOD: Bring Your Own Device Implementation and Security Issues Presentation Transcript

    • BYOD Implementation and Security Issues Presented By: Harsh Kishore Mishra M.Tech. Cyber Security I Sem. Central University of Punjab, Bathinda
    • Contents What is BYOD ? BYOD Trends Advantages of BYOD Issues in BYOD BYOD Security and Policies Conclusion
    • What is BYOD ?  BYOD was mentioned in a paper by Ballagas et al., at UBICOMP 2005.  First entered in 2009, courtesy of Intel.  The emerging trend in Information technology & corporate world.  It is the policy of permitting employees to bring personally owned mobile devices.
    • BYOD Trends  BYOD is making significant inroads in the business world.  75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets are already using it*.  88% of IT leaders see BYOD growth and 76% consider it extremely positive**.  44% of job seekers view an organization more positively if it supports their device***. *http://www.techrepublic.com/blog/10-things/10-myths-of-byod-in-theenterprise/ **A. Scarfò, New security perspectives around BYOD, IEEE 978-0-7695-4842-5/12, 2012 ***Cas ey, K evi n (19 November 2012). " Ris ks Your BYOD Policy Must Addres s "
    • Advantages of BYOD  Increased Productivity: User being more comfortable with their personal device.  Lower Cost to the Company: No devices cost to company, employee uses own device.  New Cutting edge Technology: Frequent and faster upgrades than the devices of company.  Attract and retain talent: Using personal devices attracts talent.
    • Issues in BYOD  Security Issues  Privacy Issues  Infrastructure Issues  Support Issues  Device Control Issues
    • Security and Policies  Automate enforcement of access policy.  Automatically detect and mitigate web-based threats.  Unifying policy definition on all networks.  Protect the IT infrastructure.  Ensure privacy of the information.
    • … contd.  Identify the risk elements.  Form a committee to embrace BYOD and understand the risks.  Decide how to enforce policies for devices connecting to your network.  Evaluate, Implement & reassess solutions
    • Conclusion  Business is embracing BYOD for its flexibility and cost savings.  It improves employees productivity and reduces costs.  Makes the company look like a flexible and attractive employer.  BYOD policy should be enforceable and
    • Thank You