SlideShare a Scribd company logo
1 of 10
Download to read offline
ABOUT B.Y.O.D. - BRING YOUR OWN DEVICE
Byod is the label identifying the formalisation of employees using their personal or consumer
technology, such as mobile devices & home pcs, on their corporate networks.




                                                                            




Employees have always been guilty of bringing their own choice of devices to work, despite
being provided with a company issue.




Previously nothing more than toys, these devices have gradually become so powerful they
now instantaneously produce a large percentage of the company products from marketing to
analytics.
Apple’s App Store has now seen more than 1 million approved apps since launch
Authenticating 'byod' encourages this practice while providing processes which allow audit,
tracking and management of the third party products now accepted as company critical.
Multiple solutions are being provided by the 'byod' trend including the ease of use for the
employee with no learning curves or training budgets necessary.




                           Plain sailing......


The removal of the need for duplicate devices i.e.




personnel phone                              work phone


Identify and Police device byod access

The openness of cloud computing and the enterprise mobile technologies generate new
security issues and introduce new IT security threats that need stronger regulations on what
can connect to corporate networks.
In reaction to this, unified communication solutions have introduced standards across
platforms that will allow users on various devices to safely collaborate through centralized
infrastructure.
       Bring Your Own Device
       The 10 Commandments of BYOD! Your Free Guide to a Strong BYOD Policy.
       www.maas360.com/MDM-Guide
       Bring Your Own Device
       Manage Employee Liable Devices. Secure & Flexible - Try for 30 Days
       www.air-watch.com/BYOD-Download
       Bring Your Own Device




The standards have a huge impact on traditional processes both legally and physically. We all
strive to find out how best to maintain security & compliance of the new, flexible, corporate
network topology and the personal aspects of the employees device allowing us multiple
flexible desktop environments.




Bring Your Own Detonator?




Since there have been numerous security incidents surrounding unsanctioned devices joining
the corporate networks employers have implemented ways to avoid malware being
introduced by the downloading of apps via ‘app stores' such as Google Play. This mechanism
has been undermined by the fact that this particular store now has more than 500,000 android
applications available, 100,000 of which were added in four months, making security very
hard to police.




Federation login and active directory capabilities have been introduced in an attempt to stop
intruder entry via the new channels.




A new world of risks and issues are introduced by consumers mobile devices interacting
openly with TV, print, media content and social networks which can be used to deploy
malware.
Detonate your own device?




Your device now becomes a much higher responsibility since it now has the capacity to
access your employers' network. It may make you the target of crime.
Your device may become infected by malware installed on your employees machines by their
enemies.




Approved handsets also now have personnel activity integrated with work at all times and
online and so it's hard to keep things private.




Bring Your Own 'Thing connected to the internet.'
It is not uncommon now to refer to devices as 'things connected to the internet'. This
identifies the trend for items not normally catagorised as computers to be used in business




comunication.
Point in hand is the ability to use cloud solution software such as search engines, email, social
networks like facebook and twitter etc on gym running machine and a pletharo of the other
exercise machines.
'What it is connecting' is no longer deamed easily answerable and there's a surge to becoming
device independant to accomodate this. This would encourage activities like using your smart
watch to let your manager know you've just filmed a corporate online seminar via your
google goggles.




                                    Wes Majerus, who is blind, "a great first step" after taking it for a spin.




Enterprize changes for BYOD

Identity management for employee will attempt to secure access from any device and provide
control over the influx of personnel devices.




Enforced network registration and monitoring provides the authentication of who, and what is
logging in.





The tracking of IP addresses provides the information about where and when end-users
connect.


Conclusion - in summary

Coining the phrase ‘bring your own device' is the corporate genuflect to the processing power
provided by items that were chosen as preferred by the employee as opposed to the employer.




                                                                                       The
symbiotic trend is not only acknowledged it is now supported and expected to go from
strength to strength as mobile devices gain hold of the marketplace.




Issues with these devices has been ported from the entertainment zone to commerce and must
be addressed with attention relevant to their new activities.



The predominant effects of employees having their own choice of devices in the work place
is the reduction of the i.t. infrastructure budgets and the increase in productivity and
efficiency through familiarity and preferential selection. ‘WIN WIN'.







Key learning points:
1 - About the 'bring your own device' trend.
2 - Security issues surrounding BYOD
3 - Benefits of BYOD
Moira L. Morrison, IT Specialist, moi!, UK

More Related Content

More from Incisive_Events

Louise Corti Data scientists
Louise Corti Data scientistsLouise Corti Data scientists
Louise Corti Data scientistsIncisive_Events
 
Richard Wallis Linked Data
Richard Wallis Linked DataRichard Wallis Linked Data
Richard Wallis Linked DataIncisive_Events
 
Andrew Cox Research data management
Andrew Cox Research data managementAndrew Cox Research data management
Andrew Cox Research data managementIncisive_Events
 
Anne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your researchAnne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your researchIncisive_Events
 
Mahendra Mahey British Library Labs
Mahendra Mahey British Library LabsMahendra Mahey British Library Labs
Mahendra Mahey British Library LabsIncisive_Events
 
Arthur Weiss Google vs other search tools
Arthur Weiss Google vs other search toolsArthur Weiss Google vs other search tools
Arthur Weiss Google vs other search toolsIncisive_Events
 
James Bennett CLA Search and Licence System
James Bennett CLA Search and Licence SystemJames Bennett CLA Search and Licence System
James Bennett CLA Search and Licence SystemIncisive_Events
 
Lucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly booksLucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly booksIncisive_Events
 
Max Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open AccessMax Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open AccessIncisive_Events
 
Jacob Morgan The Future of Work
Jacob Morgan The Future of WorkJacob Morgan The Future of Work
Jacob Morgan The Future of WorkIncisive_Events
 
Mark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing worldMark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing worldIncisive_Events
 
Alex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environmentAlex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environmentIncisive_Events
 
Sarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your TeamSarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your TeamIncisive_Events
 
James Andrews User Engagement
James Andrews User EngagementJames Andrews User Engagement
James Andrews User EngagementIncisive_Events
 
Heini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes HomeHeini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes HomeIncisive_Events
 
Henry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information ProfessionalsHenry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information ProfessionalsIncisive_Events
 
Ellyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information servicesEllyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information servicesIncisive_Events
 
Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration Incisive_Events
 
Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC Incisive_Events
 

More from Incisive_Events (20)

Louise Corti Data scientists
Louise Corti Data scientistsLouise Corti Data scientists
Louise Corti Data scientists
 
Richard Wallis Linked Data
Richard Wallis Linked DataRichard Wallis Linked Data
Richard Wallis Linked Data
 
Andrew Cox Research data management
Andrew Cox Research data managementAndrew Cox Research data management
Andrew Cox Research data management
 
Jan Reichelt Mendeley
Jan Reichelt MendeleyJan Reichelt Mendeley
Jan Reichelt Mendeley
 
Anne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your researchAnne Osterrieder Tools for sharing your research
Anne Osterrieder Tools for sharing your research
 
Mahendra Mahey British Library Labs
Mahendra Mahey British Library LabsMahendra Mahey British Library Labs
Mahendra Mahey British Library Labs
 
Arthur Weiss Google vs other search tools
Arthur Weiss Google vs other search toolsArthur Weiss Google vs other search tools
Arthur Weiss Google vs other search tools
 
James Bennett CLA Search and Licence System
James Bennett CLA Search and Licence SystemJames Bennett CLA Search and Licence System
James Bennett CLA Search and Licence System
 
Lucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly booksLucy Montgomery Open access for scholarly books
Lucy Montgomery Open access for scholarly books
 
Max Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open AccessMax Espley Royal Society of Chemistry and Open Access
Max Espley Royal Society of Chemistry and Open Access
 
Jacob Morgan The Future of Work
Jacob Morgan The Future of WorkJacob Morgan The Future of Work
Jacob Morgan The Future of Work
 
Mark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing worldMark Stevenson Surviving in a fast changing world
Mark Stevenson Surviving in a fast changing world
 
Alex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environmentAlex Follett Integrating your library into wider institutional environment
Alex Follett Integrating your library into wider institutional environment
 
Sarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your TeamSarah Fahy Reshaping Your Team
Sarah Fahy Reshaping Your Team
 
James Andrews User Engagement
James Andrews User EngagementJames Andrews User Engagement
James Andrews User Engagement
 
Heini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes HomeHeini Oikkonen Mobile Library App Goes Home
Heini Oikkonen Mobile Library App Goes Home
 
Henry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information ProfessionalsHenry Stiller Implementing New Roles For Information Professionals
Henry Stiller Implementing New Roles For Information Professionals
 
Ellyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information servicesEllyssa Krosky The future of libraries and information services
Ellyssa Krosky The future of libraries and information services
 
Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration Miguel Garcia How Yammer Can Improve Collaboration
Miguel Garcia How Yammer Can Improve Collaboration
 
Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC Paula Young Transforming how works gets done at PwC
Paula Young Transforming how works gets done at PwC
 

B.Y.O.D. - Moira l. Morrison

  • 1. ABOUT B.Y.O.D. - BRING YOUR OWN DEVICE Byod is the label identifying the formalisation of employees using their personal or consumer technology, such as mobile devices & home pcs, on their corporate networks.  Employees have always been guilty of bringing their own choice of devices to work, despite being provided with a company issue. Previously nothing more than toys, these devices have gradually become so powerful they now instantaneously produce a large percentage of the company products from marketing to analytics. Apple’s App Store has now seen more than 1 million approved apps since launch Authenticating 'byod' encourages this practice while providing processes which allow audit, tracking and management of the third party products now accepted as company critical.
  • 2. Multiple solutions are being provided by the 'byod' trend including the ease of use for the employee with no learning curves or training budgets necessary. Plain sailing...... The removal of the need for duplicate devices i.e. personnel phone work phone Identify and Police device byod access The openness of cloud computing and the enterprise mobile technologies generate new security issues and introduce new IT security threats that need stronger regulations on what can connect to corporate networks.
  • 3. In reaction to this, unified communication solutions have introduced standards across platforms that will allow users on various devices to safely collaborate through centralized infrastructure. Bring Your Own Device The 10 Commandments of BYOD! Your Free Guide to a Strong BYOD Policy. www.maas360.com/MDM-Guide Bring Your Own Device Manage Employee Liable Devices. Secure & Flexible - Try for 30 Days www.air-watch.com/BYOD-Download Bring Your Own Device The standards have a huge impact on traditional processes both legally and physically. We all strive to find out how best to maintain security & compliance of the new, flexible, corporate
  • 4. network topology and the personal aspects of the employees device allowing us multiple flexible desktop environments. Bring Your Own Detonator? Since there have been numerous security incidents surrounding unsanctioned devices joining the corporate networks employers have implemented ways to avoid malware being introduced by the downloading of apps via ‘app stores' such as Google Play. This mechanism
  • 5. has been undermined by the fact that this particular store now has more than 500,000 android applications available, 100,000 of which were added in four months, making security very hard to police. Federation login and active directory capabilities have been introduced in an attempt to stop intruder entry via the new channels. A new world of risks and issues are introduced by consumers mobile devices interacting openly with TV, print, media content and social networks which can be used to deploy malware.
  • 6. Detonate your own device? Your device now becomes a much higher responsibility since it now has the capacity to access your employers' network. It may make you the target of crime.
  • 7. Your device may become infected by malware installed on your employees machines by their enemies. Approved handsets also now have personnel activity integrated with work at all times and online and so it's hard to keep things private. Bring Your Own 'Thing connected to the internet.' It is not uncommon now to refer to devices as 'things connected to the internet'. This identifies the trend for items not normally catagorised as computers to be used in business comunication. Point in hand is the ability to use cloud solution software such as search engines, email, social networks like facebook and twitter etc on gym running machine and a pletharo of the other exercise machines.
  • 8. 'What it is connecting' is no longer deamed easily answerable and there's a surge to becoming device independant to accomodate this. This would encourage activities like using your smart watch to let your manager know you've just filmed a corporate online seminar via your google goggles. Wes Majerus, who is blind, "a great first step" after taking it for a spin. Enterprize changes for BYOD Identity management for employee will attempt to secure access from any device and provide control over the influx of personnel devices. Enforced network registration and monitoring provides the authentication of who, and what is logging in.
  • 9.  The tracking of IP addresses provides the information about where and when end-users connect. Conclusion - in summary Coining the phrase ‘bring your own device' is the corporate genuflect to the processing power provided by items that were chosen as preferred by the employee as opposed to the employer. The symbiotic trend is not only acknowledged it is now supported and expected to go from strength to strength as mobile devices gain hold of the marketplace. Issues with these devices has been ported from the entertainment zone to commerce and must be addressed with attention relevant to their new activities.
  • 10.  The predominant effects of employees having their own choice of devices in the work place is the reduction of the i.t. infrastructure budgets and the increase in productivity and efficiency through familiarity and preferential selection. ‘WIN WIN'.  Key learning points: 1 - About the 'bring your own device' trend. 2 - Security issues surrounding BYOD 3 - Benefits of BYOD Moira L. Morrison, IT Specialist, moi!, UK