SlideShare a Scribd company logo
BYOD Improves Workplace Productivity
But at What Cost?
The evolution of mobile computing devices has
transformed the way we live and work.
Many organizations now implement
“bring your own device” (BYOD) policies.
From laptops to tablets and smartphones, users
have been set free from their desks.
The workforce can always be connected, through
devices both personal and professional
The Pros and Cons of:
Bring Your Own Device
Team members are always
reachable on their work devices
A recent study links BYOD
to increased efficiency and
productivity.
Less investment in devices
means lower cost to the
organization
THE PROS
So much access on so many
devices means increased
security risk
Less employer control
over user access and device
applications
Higher device diversity can lead
to infrastructure challenges
THE CONS
Q: Do the pros of BYOD
outweigh the cons for
employers?
PROS
CONS
Q: Do the pros of BYOD
outweigh the cons for
employers?
A: Of course!
PROS
CONS
Gartner predicts that
almost half of employers
will require employees to
use BYOD devices by 2017.
Progress stops for no one
especially when it comes
to new technology.
How to to Manage BYOD
Workplaces as Securely
as Possible
Create a BYOD Policy
Only 38% of IT departments
have implemented a formal
BYOD policy (SANS Institute)
STEP 1:
“The gap between BYOD use and BYOD policies
is both staggering and frightening.”
Alan Shimel,
CEO at The CISO Group
Questions to Help Determine BYOD
Policy:
Are all devices allowed or only certain
types and models?
Should all devices in use have to be
pre-registered?
What restrictions on access, if any, are
there?
Enforce Your BYOD PolicySTEP 2:
The Honor System doesn’t offer
much in the way of oversight or
enforcement.
The Pro-Active Approach is to use a tool
such as a mobile device manager (MDM).
Just install it as an agent on a user’s device.
The MDM automatically enforces policies
that you’ve defined on devices and in apps.
And you have access to info on device usage
and data storage/transfer.
Teach Your BYOD PolicySTEP 3:
A BYOD policy educates employees on the
What, How and Why.
Why
“The Why”?
Employees tend to view
these policies as arbitrary.
They must understand
that these policies help
achieve a worthy goal.
Put a “Breach Plan” in PlaceSTEP 4:
“Hope for the best,
plan for the worst.”
Lee Child,
When device and network security is
compromised, having an action plan in
place is what separates the safe from
the sorry.
Have a checklist and make sure key
players know what is expected of
them.
With Good Management
and Security Practices,
The Benefits of BYOD
Outweigh Risks
BYOD usage has led to productivity
gains and can make your team more
responsive.
In an era of “always on”, BYOD lets
your organization be always on too.
Security risks can be avoided with
proactive BYOD policy and planning.
an enticing opportunity for
increased productivity and
efficiency.
BYOD:
Check out our entire eBook:
The Guide to Doing More Faster.
Now with IT Control
In this eBook, thought leaders Gene Kim (author and
DevOps evangelist), Rajat Bhargava (CEO JumpCloud),
Ben Kepes (Forbes contributor), Alan Shimel (DevOps.
com Executive Editor) discuss actionable steps for
how modern IT teams build decentralization into their
organization while maximizing the security that their IT
team needs to keep their organization safe.

More Related Content

What's hot

IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
EC-Council
 
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
DefconRussia
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Access control system
Access control systemAccess control system
Access control system
Matrix COSEC
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
Ahmedalhassar1
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
 
security onion
security onionsecurity onion
security onion
Boni Yeamin
 
201412 정보보안 보안교육자료
201412 정보보안 보안교육자료201412 정보보안 보안교육자료
201412 정보보안 보안교육자료
시온시큐리티
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdf
AhmedRKhan
 
보안교육자료
보안교육자료보안교육자료
보안교육자료
YoungJin Shin
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
Alfred Ouyang
 
DFIR
DFIRDFIR
DFIR
Kblblkb
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
abodiford
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 

What's hot (20)

IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Access control system
Access control systemAccess control system
Access control system
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
security onion
security onionsecurity onion
security onion
 
201412 정보보안 보안교육자료
201412 정보보안 보안교육자료201412 정보보안 보안교육자료
201412 정보보안 보안교육자료
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdf
 
보안교육자료
보안교육자료보안교육자료
보안교육자료
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
DFIR
DFIRDFIR
DFIR
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 

Similar to 5 Steps to Successful BYOD Implementation

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
BYOD
BYODBYOD
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
ManageEngine
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
Hexnode
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
4imprint
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
Softweb Solutions
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Mobiloitte
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
Barcoding, Inc.
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
DMIMarketing
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Martin Perry
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
Ravi namboori
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Jim Kaplan CIA CFE
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
Arlette Measures
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
NEORIS
 
2013 byod mobile index
2013 byod mobile index2013 byod mobile index
2013 byod mobile index
Prayukth K V
 

Similar to 5 Steps to Successful BYOD Implementation (20)

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD
BYODBYOD
BYOD
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
2013 byod mobile index
2013 byod mobile index2013 byod mobile index
2013 byod mobile index
 

More from JumpCloud

The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
JumpCloud
 
5 Steps for a High-Performing DevOps Culture
5 Steps for a High-Performing DevOps Culture5 Steps for a High-Performing DevOps Culture
5 Steps for a High-Performing DevOps Culture
JumpCloud
 
How to Leverage SaaS Apps with Minimal Risk
How to Leverage SaaS Apps with Minimal RiskHow to Leverage SaaS Apps with Minimal Risk
How to Leverage SaaS Apps with Minimal Risk
JumpCloud
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
JumpCloud
 
How IT can Choose the Right Technologies
How IT can Choose the Right TechnologiesHow IT can Choose the Right Technologies
How IT can Choose the Right Technologies
JumpCloud
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
JumpCloud
 

More from JumpCloud (6)

The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
5 Steps for a High-Performing DevOps Culture
5 Steps for a High-Performing DevOps Culture5 Steps for a High-Performing DevOps Culture
5 Steps for a High-Performing DevOps Culture
 
How to Leverage SaaS Apps with Minimal Risk
How to Leverage SaaS Apps with Minimal RiskHow to Leverage SaaS Apps with Minimal Risk
How to Leverage SaaS Apps with Minimal Risk
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
How IT can Choose the Right Technologies
How IT can Choose the Right TechnologiesHow IT can Choose the Right Technologies
How IT can Choose the Right Technologies
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 

Recently uploaded

Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 

Recently uploaded (20)

Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 

5 Steps to Successful BYOD Implementation

  • 1. BYOD Improves Workplace Productivity But at What Cost?
  • 2. The evolution of mobile computing devices has transformed the way we live and work.
  • 3. Many organizations now implement “bring your own device” (BYOD) policies. From laptops to tablets and smartphones, users have been set free from their desks. The workforce can always be connected, through devices both personal and professional
  • 4. The Pros and Cons of: Bring Your Own Device
  • 5. Team members are always reachable on their work devices A recent study links BYOD to increased efficiency and productivity. Less investment in devices means lower cost to the organization THE PROS
  • 6. So much access on so many devices means increased security risk Less employer control over user access and device applications Higher device diversity can lead to infrastructure challenges THE CONS
  • 7. Q: Do the pros of BYOD outweigh the cons for employers? PROS CONS
  • 8. Q: Do the pros of BYOD outweigh the cons for employers? A: Of course! PROS CONS
  • 9. Gartner predicts that almost half of employers will require employees to use BYOD devices by 2017. Progress stops for no one especially when it comes to new technology.
  • 10. How to to Manage BYOD Workplaces as Securely as Possible
  • 11. Create a BYOD Policy Only 38% of IT departments have implemented a formal BYOD policy (SANS Institute) STEP 1:
  • 12. “The gap between BYOD use and BYOD policies is both staggering and frightening.” Alan Shimel, CEO at The CISO Group
  • 13. Questions to Help Determine BYOD Policy: Are all devices allowed or only certain types and models? Should all devices in use have to be pre-registered? What restrictions on access, if any, are there?
  • 14. Enforce Your BYOD PolicySTEP 2:
  • 15. The Honor System doesn’t offer much in the way of oversight or enforcement. The Pro-Active Approach is to use a tool such as a mobile device manager (MDM). Just install it as an agent on a user’s device. The MDM automatically enforces policies that you’ve defined on devices and in apps. And you have access to info on device usage and data storage/transfer.
  • 16. Teach Your BYOD PolicySTEP 3:
  • 17. A BYOD policy educates employees on the What, How and Why.
  • 19. Employees tend to view these policies as arbitrary. They must understand that these policies help achieve a worthy goal.
  • 20. Put a “Breach Plan” in PlaceSTEP 4:
  • 21. “Hope for the best, plan for the worst.” Lee Child,
  • 22. When device and network security is compromised, having an action plan in place is what separates the safe from the sorry.
  • 23. Have a checklist and make sure key players know what is expected of them.
  • 24. With Good Management and Security Practices, The Benefits of BYOD Outweigh Risks
  • 25. BYOD usage has led to productivity gains and can make your team more responsive.
  • 26. In an era of “always on”, BYOD lets your organization be always on too.
  • 27. Security risks can be avoided with proactive BYOD policy and planning.
  • 28. an enticing opportunity for increased productivity and efficiency. BYOD:
  • 29. Check out our entire eBook: The Guide to Doing More Faster. Now with IT Control In this eBook, thought leaders Gene Kim (author and DevOps evangelist), Rajat Bhargava (CEO JumpCloud), Ben Kepes (Forbes contributor), Alan Shimel (DevOps. com Executive Editor) discuss actionable steps for how modern IT teams build decentralization into their organization while maximizing the security that their IT team needs to keep their organization safe.