Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

BYOD: Bring Your Own Device Implementation and Security Issues


Published on

This presentation describes the simple concept behind the emerging technology trend that is BYOD.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

BYOD: Bring Your Own Device Implementation and Security Issues

  1. 1. BYOD Implementation and Security Issues Presented By: Harsh Kishore Mishra M.Tech. Cyber Security I Sem. Central University of Punjab, Bathinda
  2. 2. Contents What is BYOD ? BYOD Trends Advantages of BYOD Issues in BYOD BYOD Security and Policies Conclusion
  3. 3. What is BYOD ?  BYOD was mentioned in a paper by Ballagas et al., at UBICOMP 2005.  First entered in 2009, courtesy of Intel.  The emerging trend in Information technology & corporate world.  It is the policy of permitting employees to bring personally owned mobile devices.
  4. 4. BYOD Trends  BYOD is making significant inroads in the business world.  75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets are already using it*.  88% of IT leaders see BYOD growth and 76% consider it extremely positive**.  44% of job seekers view an organization more positively if it supports their device***. * **A. Scarfò, New security perspectives around BYOD, IEEE 978-0-7695-4842-5/12, 2012 ***Cas ey, K evi n (19 November 2012). " Ris ks Your BYOD Policy Must Addres s "
  5. 5. Advantages of BYOD  Increased Productivity: User being more comfortable with their personal device.  Lower Cost to the Company: No devices cost to company, employee uses own device.  New Cutting edge Technology: Frequent and faster upgrades than the devices of company.  Attract and retain talent: Using personal devices attracts talent.
  6. 6. Issues in BYOD  Security Issues  Privacy Issues  Infrastructure Issues  Support Issues  Device Control Issues
  7. 7. Security and Policies  Automate enforcement of access policy.  Automatically detect and mitigate web-based threats.  Unifying policy definition on all networks.  Protect the IT infrastructure.  Ensure privacy of the information.
  8. 8. … contd.  Identify the risk elements.  Form a committee to embrace BYOD and understand the risks.  Decide how to enforce policies for devices connecting to your network.  Evaluate, Implement & reassess solutions
  9. 9. Conclusion  Business is embracing BYOD for its flexibility and cost savings.  It improves employees productivity and reduces costs.  Makes the company look like a flexible and attractive employer.  BYOD policy should be enforceable and
  10. 10. Thank You