ABOUT B.Y.O.D. - BRING YOUR OWN DEVICEByod is the label identifying the formalisation of employees using their personal or consumertechnology, such as mobile devices & home pcs, on their corporate networks. ￼￼Employees have always been guilty of bringing their own choice of devices to work, despitebeing provided with a company issue.Previously nothing more than toys, these devices have gradually become so powerful theynow instantaneously produce a large percentage of the company products from marketing toanalytics.Apple’s App Store has now seen more than 1 million approved apps since launchAuthenticating byod encourages this practice while providing processes which allow audit,tracking and management of the third party products now accepted as company critical.
Multiple solutions are being provided by the byod trend including the ease of use for theemployee with no learning curves or training budgets necessary. Plain sailing......The removal of the need for duplicate devices i.e.personnel phone work phoneIdentify and Police device byod accessThe openness of cloud computing and the enterprise mobile technologies generate newsecurity issues and introduce new IT security threats that need stronger regulations on whatcan connect to corporate networks.
In reaction to this, unified communication solutions have introduced standards acrossplatforms that will allow users on various devices to safely collaborate through centralizedinfrastructure. Bring Your Own Device The 10 Commandments of BYOD! Your Free Guide to a Strong BYOD Policy. www.maas360.com/MDM-Guide Bring Your Own Device Manage Employee Liable Devices. Secure & Flexible - Try for 30 Days www.air-watch.com/BYOD-Download Bring Your Own DeviceThe standards have a huge impact on traditional processes both legally and physically. We allstrive to find out how best to maintain security & compliance of the new, flexible, corporate
network topology and the personal aspects of the employees device allowing us multipleflexible desktop environments.Bring Your Own Detonator?Since there have been numerous security incidents surrounding unsanctioned devices joiningthe corporate networks employers have implemented ways to avoid malware beingintroduced by the downloading of apps via ‘app stores such as Google Play. This mechanism
has been undermined by the fact that this particular store now has more than 500,000 androidapplications available, 100,000 of which were added in four months, making security veryhard to police.Federation login and active directory capabilities have been introduced in an attempt to stopintruder entry via the new channels.A new world of risks and issues are introduced by consumers mobile devices interactingopenly with TV, print, media content and social networks which can be used to deploymalware.
Detonate your own device?Your device now becomes a much higher responsibility since it now has the capacity toaccess your employers network. It may make you the target of crime.
Your device may become infected by malware installed on your employees machines by theirenemies.Approved handsets also now have personnel activity integrated with work at all times andonline and so its hard to keep things private.Bring Your Own Thing connected to the internet.It is not uncommon now to refer to devices as things connected to the internet. Thisidentifies the trend for items not normally catagorised as computers to be used in businesscomunication.Point in hand is the ability to use cloud solution software such as search engines, email, socialnetworks like facebook and twitter etc on gym running machine and a pletharo of the otherexercise machines.
What it is connecting is no longer deamed easily answerable and theres a surge to becomingdevice independant to accomodate this. This would encourage activities like using your smartwatch to let your manager know youve just filmed a corporate online seminar via yourgoogle goggles. Wes Majerus, who is blind, "a great first step" after taking it for a spin.Enterprize changes for BYODIdentity management for employee will attempt to secure access from any device and providecontrol over the influx of personnel devices.Enforced network registration and monitoring provides the authentication of who, and what islogging in.
￼￼The tracking of IP addresses provides the information about where and when end-usersconnect.Conclusion - in summaryCoining the phrase ‘bring your own device is the corporate genuflect to the processing powerprovided by items that were chosen as preferred by the employee as opposed to the employer. Thesymbiotic trend is not only acknowledged it is now supported and expected to go fromstrength to strength as mobile devices gain hold of the marketplace.Issues with these devices has been ported from the entertainment zone to commerce and mustbe addressed with attention relevant to their new activities.
￼￼￼￼The predominant effects of employees having their own choice of devices in the work placeis the reduction of the i.t. infrastructure budgets and the increase in productivity andefficiency through familiarity and preferential selection. ‘WIN WIN.￼￼￼￼Key learning points:1 - About the bring your own device trend.2 - Security issues surrounding BYOD3 - Benefits of BYODMoira L. Morrison, IT Specialist, moi!, UK