Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this


  1. 1. There are two technologies in particular which are in themselves becoming integral to IT operations and that are subsequently supporting the growth in BYOD - they arecloud computing and Virtual Private Networks (VPNs). Whilst there are many technologytrends that are pushing the adoption of BYOD policies, these two are providing businesses with the key tools they need to overcome some of the challenges that BYOD brings with hosting
  2. 2. Connectivity and Interoperability The key to BYOD's success isalso one of its biggest hurdles and that is the variety of devices andplatforms that it introduces into the IT systems equation Users will behoping to connect from a broad range of devices such as laptops, tabletsand smartphones, running all manner of operating systems including themore traditional Windows, Mac OS and Linux alongside the newer kidson the block in the mobile sphere: iOS, Android, Windows Mobile andBlackberry for example For organisations where the workers need toconnect to the local network, VPN is the key Tunnelling into a local areanetwork across a VPN can allow users to access the files and/or controlthe applications on local (office) machines that they need for their dailywork regardless of the device they are using, and their location, as longas they have an internet connection
  3. 3. Although many applications have releases which support mostoperating systems it can be a real headache rolling out an application suitacross such a variety of platforms However, the all-conquering conceptof cloud computing can offer a truly interoperable application solutionMore specifically Software as a Service (SaaS) offerings, such a GoogleDocs or Microsoft Office 365, together with cloud storage, allow workersto operate within the cloud and therefore seamlessly between the officeand on the go Again, the only condition to use these services is that theuser has an internet connection
  4. 4. Security Arguably the greatest challenge faced by organisationsembracing BYOD is that of security; ensuring that personal devicesaren't compromised in themselves and don't pose a securitythreat to the rest of the network Allowing BYODs introduces many morevulnerabilities at various steps in the network and so there are manyways in which these risks can and need to be addressed The first stepis to reduce the risk of the personal device being compromised in the firstplace
  5. 5. This is particularly pertinent where employees are bringing their owndevice in to connect to the businesses LAN To achieve this, someorganisations have conditions of use which require that the user'sdevice has specific anti virus and management software installed beforeit can be allowed onto the network However, the risks can also bereduced by ensuring that personal devices are only allowed to connect tothe local network via a VPN rather than a direct connection, even whenthe user is on site
  6. 6. Using a VPN is a must for users in remote locations as the securetunnel of a VPN prevents any information being intercepted in transit Itcan be tempting for employees working off-site (or even on site) onpersonal devices to email documents, for example, backwards andforwards but the security of such communications can never beguaranteed What's more that approach requires that at leastsome work data is stored locally on the personal device - a cardinal sin interms of data protection
  7. 7. Again both VPNs and cloud solutions can negate the need to store localdata Using a VPN will allow the worker to operate on the local network,accessing, working on and storing everything they need on there, ratherthan on their own device Secure cloud services on the other hand can beused to provide collaborative workspaces where users perform all theirwork in cheap hosting the cloud so that colleagues, wherever they are,can access it
  8. 8. However care should be taken to check the security measures used bycloud providers before signing up to such services whilst the user mustalso ensure that someone who misappropriates a device can't theneasily access their cloud account (through lack of device security andstored passwords etc) All this, plus implementing measures such asimproved secure wireless networks in the work place, may result ingreater spending on IT security and connectivity, but this should, asmentioned above, easily be offset by the direct and indirect financialbenefits experienced elsewhere across the IT budget and the businessas a whole
  9. 9. cheap hosting