SlideShare a Scribd company logo
1 of 3
Download to read offline
Bring your own device (BYOD) is here to stay, but what about the
risks?

James Tay, CEO at Logicalis Asia, considers the options when it comes to managing the data security risks
associated with BYOD. Should it be the traditional Network Access Control (NAC) approach, the belt and braces
of Mobile Device Management or the less invasive Mobile Application Management?


Today, nine out of 10 people worldwide own a mobile phone - that ubiquity, along with the rise of smart devices,
has led more and more organisations to allow employees to use their own mobile devices in the work place. As
has been explored in previous posts, the rise of ‘Bring Your Own Device’ (BYOD) opens up opportunities and
threats in almost equal measure.


On the plus side are reduced capital costs and the chance to drive innovation throughout the organisation – but
on the downside are the risks to data security and the complexity that comes with supporting a wide range of
devices. My conversations with customers and colleagues confirm that these are the issues that are exercising
the minds of CXOs considering opening the door to BYOD – data security more than most.


So what are the options when it comes to managing and mitigating data security risks?


Extend and adapt traditional control systems?


Traditionally, networking vendors have employed NAC hardware devices to manage access to corporate
infrastructure. The emergence of BYOD has prompted many of these vendors to expand NAC device
functionality to provide further profiling and context-aware intelligence – gathering information from the device,
the infrastructure and network services before granting or denying access to network services.


Although context awareness provides granularity, all restrictions are facilitated by network equipment like
switches and routers. In some ways I see this approach as something of a workaround, with potential downsides
including a less than slick user experience and knock on effects for productivity. It can work, but it’s not ideal.


Use Mobile Device Management to lock BYOD down?


A second option is to deploy Mobile Device Management, or MDM, which is a software service that monitors,
manages and supports mobile devices deployed across mobile operators, service providers and enterprises.


It’s not a new technology. In fact, it’s been around for years, but MDM is a workable solution. It overcomes the
challenges of providing end-user convenience while achieving the required enterprise security – in essence it
ensures that a line is drawn between mobile work and play.


MDM solutions deliver high levels of data encryption, compliance checking and security breach detection. This
type of service even protects the enterprise if a device is lost or stolen – data stored on the phone is encrypted
and can be remotely erased if necessary.


At the same time, MDM provides cloud options with self-service portals so that users can access a quick and
hassle-free service. Up to a point, this supports employee satisfaction and helps organisations to attract and
retain talent – on top of the wider organisational and cost benefits of BYOD.


Visit Logicalis’ blog www.cxounplugged.com                                                                  1
There is no doubt that MDM simplifies the deployment and management of BYOD infrastructure, but it’s also
pretty clear that it is not a perfect solution – that is not so much about its efficacy, but about its likely popularity
amongst employees.


Go for a hybrid MDM and MAM solution?


The issue with MDM as a one-stop BYOD security solution is this – many feel MDM is somewhat invasive and
just don’t like the idea that corporate IT is able to access private data.


The point is, in a BYOD environment, you can’t dismiss those concerns. In fact, I think those perceptions could
seriously undermine user confidence in BYOD – aggressively controlling the entire device, allowing camera
disabling, denying access to App Store, as well as locking or erasing data from compromised devices risks
making BYOD feel more like ‘buy your own device’ than ‘bring your own device’. It’s hard to see why many
employees would be keen to sign up to that kind of arrangement.


In my view, that need to balance user satisfaction with the needs of enterprise security, is the main reason Mobile
Application Management (MAM) has increasingly been added to the BYOD mix. MAM enables IT departments to
control the corporate applications and content deployed to an employee’s device without encroaching upon the
employees’ private data – and that is a really important distinction.


In fact, MAM is increasingly becoming a preferred approach. But it is worth remembering that MAM and MDM are
complementary technologies, since MAM focuses on the software while MDM leverages the hardware. Indeed,
MDM vendors are increasingly defining themselves as MobileIT, essentially a combination of MAM and MDM –
and this is, at the very least, a solution worth considering.


The right balance


The key for CXOs seeking to enable a BYOD culture is to find a solution that balances flexibility with control. Any
solution which goes too far in limiting or controlling the use of devices bought and paid for by employees
themselves is likely to be resented, or even rejected altogether – rendering BYOD dead in the water.


On the other hand, realising the potential cost and resource efficiency, innovation and employee satisfaction that
BYOD can underpin should never come at the expense of data security.


In my opinion, solutions to these challenges are still evolving and, of course, the right choice will depend on the
nature of the business – so it is worth exploring all the options in detail.


However, given the need to balance flexibility with control, it is not a great surprise to see the tide turning in
favour of MDM/MAM or MobileIT – and it is certainly the best, most flexible option available at the moment.




Visit Logicalis’ blog www.cxounplugged.com                                                                        2
About James Tay

James Tay, Chief Executive Officer, Logicalis Asia


James Tay is the Chief Executive Officer of Logicalis Asia. Prior to Logicalis’ acquisition of the NetStar Group in
January 2010, James had held the same position in NetStar. During his 8 years of services with (NetStar, then)
Logicalis, he has transformed the Company from a product-focused organisation to one that is centred on
Managed Services.


An ICT industry veteran, James was President of Sales at EDS PLM in Asia Pacific prior to joining NetStar.
During his 16-year tenure at EDS, James held other senior management positions at various levels. He was the
Managing Director for Asia, and was directly involved in setting up the EDS offices in China, Indonesia, Malaysia,
Singapore, Taiwan and Thailand, as well as establishing distributor networks in Korea and the Philippines.

James received his Master’s degree in Engineering Business Management from the University of Warwick, U.K.




Visit Logicalis’ blog www.cxounplugged.com                                                                  3

More Related Content

What's hot

eBook Unified Communications
eBook Unified Communications eBook Unified Communications
eBook Unified Communications Khiara McMillin
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseAhmed Banafa
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Webinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementWebinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementCoreDigitalWorks
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 

What's hot (19)

eBook Unified Communications
eBook Unified Communications eBook Unified Communications
eBook Unified Communications
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Security that works
Security that worksSecurity that works
Security that works
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Webinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementWebinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee Engagement
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 

Viewers also liked

Logicalis Case Study - American Foods Group
Logicalis Case Study - American Foods GroupLogicalis Case Study - American Foods Group
Logicalis Case Study - American Foods GroupLogicalis
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis
 
Business analytics a certain something
Business analytics   a certain somethingBusiness analytics   a certain something
Business analytics a certain somethingLogicalis
 
2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville
2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville
2012 Nissan Rogue For Sale NC | Nissan Dealer Near JacksonvilleAllianceNissanNC
 
Logicalis - Unified Communications Overview
Logicalis - Unified Communications OverviewLogicalis - Unified Communications Overview
Logicalis - Unified Communications OverviewLogicalis
 
The Shadow IT Phenomenon - CIO Survey Highlights
The Shadow IT Phenomenon - CIO Survey HighlightsThe Shadow IT Phenomenon - CIO Survey Highlights
The Shadow IT Phenomenon - CIO Survey HighlightsLogicalis
 

Viewers also liked (6)

Logicalis Case Study - American Foods Group
Logicalis Case Study - American Foods GroupLogicalis Case Study - American Foods Group
Logicalis Case Study - American Foods Group
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services Capabilities
 
Business analytics a certain something
Business analytics   a certain somethingBusiness analytics   a certain something
Business analytics a certain something
 
2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville
2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville
2012 Nissan Rogue For Sale NC | Nissan Dealer Near Jacksonville
 
Logicalis - Unified Communications Overview
Logicalis - Unified Communications OverviewLogicalis - Unified Communications Overview
Logicalis - Unified Communications Overview
 
The Shadow IT Phenomenon - CIO Survey Highlights
The Shadow IT Phenomenon - CIO Survey HighlightsThe Shadow IT Phenomenon - CIO Survey Highlights
The Shadow IT Phenomenon - CIO Survey Highlights
 

Similar to Bring your own device (byod) is here to stay, but what about the risks

Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilitySanjay Abraham
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011fivehmg_m
 
Is MDM In the Cloud Right For You?
Is MDM In the Cloud Right For You?Is MDM In the Cloud Right For You?
Is MDM In the Cloud Right For You?Innovative_Systems
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility managementTim Youm
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMdocallahan
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...Diego Alberto Tamayo
 
Future Trends in MDM Software
Future Trends in MDM SoftwareFuture Trends in MDM Software
Future Trends in MDM SoftwareDataIO Pvt. Ltd.
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1pStéphane Roule
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1pStéphane Roule
 
Mobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelMobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelNirmal Misra
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device ManagmentMTG IT Professionals
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Happiest Minds Technologies
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 

Similar to Bring your own device (byod) is here to stay, but what about the risks (20)

Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
The key business drivers for Enterprise Mobility
The key business drivers for Enterprise MobilityThe key business drivers for Enterprise Mobility
The key business drivers for Enterprise Mobility
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011
 
Is MDM In the Cloud Right For You?
Is MDM In the Cloud Right For You?Is MDM In the Cloud Right For You?
Is MDM In the Cloud Right For You?
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Maas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDMMaas360 by fiberlink ABCs of MDM
Maas360 by fiberlink ABCs of MDM
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
Future Trends in MDM Software
Future Trends in MDM SoftwareFuture Trends in MDM Software
Future Trends in MDM Software
 
Business transformation
Business transformationBusiness transformation
Business transformation
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p
 
151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p151002_oml_mobile_device_management_v1p
151002_oml_mobile_device_management_v1p
 
Mobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelMobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next Level
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Expert MDM
Expert MDMExpert MDM
Expert MDM
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 

More from Logicalis

Logicalis Global CIO Survey 2016
Logicalis Global CIO Survey 2016Logicalis Global CIO Survey 2016
Logicalis Global CIO Survey 2016Logicalis
 
Logicalis Annual Review 2012
Logicalis Annual Review 2012Logicalis Annual Review 2012
Logicalis Annual Review 2012Logicalis
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Logicalis - Data Centre Overview
Logicalis - Data Centre OverviewLogicalis - Data Centre Overview
Logicalis - Data Centre OverviewLogicalis
 
Logicalis - Cloud computing overview
Logicalis - Cloud computing overviewLogicalis - Cloud computing overview
Logicalis - Cloud computing overviewLogicalis
 
Logicalis Case Study - Regal entertainment group
Logicalis Case Study - Regal entertainment groupLogicalis Case Study - Regal entertainment group
Logicalis Case Study - Regal entertainment groupLogicalis
 
Logicalis Case Study - Enspire
Logicalis Case Study - EnspireLogicalis Case Study - Enspire
Logicalis Case Study - EnspireLogicalis
 
Logicalis Case Study - Crown
Logicalis Case Study -   CrownLogicalis Case Study -   Crown
Logicalis Case Study - CrownLogicalis
 
Logicalis Case Study - Cathay bank
Logicalis Case Study - Cathay bankLogicalis Case Study - Cathay bank
Logicalis Case Study - Cathay bankLogicalis
 
Logicalis Case Study - API Healthcare
Logicalis Case Study - API Healthcare  Logicalis Case Study - API Healthcare
Logicalis Case Study - API Healthcare Logicalis
 
Logicalis Case Study - Verna Group
Logicalis Case Study - Verna GroupLogicalis Case Study - Verna Group
Logicalis Case Study - Verna GroupLogicalis
 
Logicalis Case Study - Gamesys
Logicalis Case Study - GamesysLogicalis Case Study - Gamesys
Logicalis Case Study - GamesysLogicalis
 
Logicalis Case Study - AMEC
Logicalis Case Study - AMECLogicalis Case Study - AMEC
Logicalis Case Study - AMECLogicalis
 
Logicalis Annual Review 2009
Logicalis Annual Review 2009Logicalis Annual Review 2009
Logicalis Annual Review 2009Logicalis
 
Logicalis Annual Review 2010
Logicalis Annual Review 2010Logicalis Annual Review 2010
Logicalis Annual Review 2010Logicalis
 
Logicalis Annual Review 2011
Logicalis Annual Review 2011Logicalis Annual Review 2011
Logicalis Annual Review 2011Logicalis
 

More from Logicalis (16)

Logicalis Global CIO Survey 2016
Logicalis Global CIO Survey 2016Logicalis Global CIO Survey 2016
Logicalis Global CIO Survey 2016
 
Logicalis Annual Review 2012
Logicalis Annual Review 2012Logicalis Annual Review 2012
Logicalis Annual Review 2012
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Logicalis - Data Centre Overview
Logicalis - Data Centre OverviewLogicalis - Data Centre Overview
Logicalis - Data Centre Overview
 
Logicalis - Cloud computing overview
Logicalis - Cloud computing overviewLogicalis - Cloud computing overview
Logicalis - Cloud computing overview
 
Logicalis Case Study - Regal entertainment group
Logicalis Case Study - Regal entertainment groupLogicalis Case Study - Regal entertainment group
Logicalis Case Study - Regal entertainment group
 
Logicalis Case Study - Enspire
Logicalis Case Study - EnspireLogicalis Case Study - Enspire
Logicalis Case Study - Enspire
 
Logicalis Case Study - Crown
Logicalis Case Study -   CrownLogicalis Case Study -   Crown
Logicalis Case Study - Crown
 
Logicalis Case Study - Cathay bank
Logicalis Case Study - Cathay bankLogicalis Case Study - Cathay bank
Logicalis Case Study - Cathay bank
 
Logicalis Case Study - API Healthcare
Logicalis Case Study - API Healthcare  Logicalis Case Study - API Healthcare
Logicalis Case Study - API Healthcare
 
Logicalis Case Study - Verna Group
Logicalis Case Study - Verna GroupLogicalis Case Study - Verna Group
Logicalis Case Study - Verna Group
 
Logicalis Case Study - Gamesys
Logicalis Case Study - GamesysLogicalis Case Study - Gamesys
Logicalis Case Study - Gamesys
 
Logicalis Case Study - AMEC
Logicalis Case Study - AMECLogicalis Case Study - AMEC
Logicalis Case Study - AMEC
 
Logicalis Annual Review 2009
Logicalis Annual Review 2009Logicalis Annual Review 2009
Logicalis Annual Review 2009
 
Logicalis Annual Review 2010
Logicalis Annual Review 2010Logicalis Annual Review 2010
Logicalis Annual Review 2010
 
Logicalis Annual Review 2011
Logicalis Annual Review 2011Logicalis Annual Review 2011
Logicalis Annual Review 2011
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Bring your own device (byod) is here to stay, but what about the risks

  • 1. Bring your own device (BYOD) is here to stay, but what about the risks? James Tay, CEO at Logicalis Asia, considers the options when it comes to managing the data security risks associated with BYOD. Should it be the traditional Network Access Control (NAC) approach, the belt and braces of Mobile Device Management or the less invasive Mobile Application Management? Today, nine out of 10 people worldwide own a mobile phone - that ubiquity, along with the rise of smart devices, has led more and more organisations to allow employees to use their own mobile devices in the work place. As has been explored in previous posts, the rise of ‘Bring Your Own Device’ (BYOD) opens up opportunities and threats in almost equal measure. On the plus side are reduced capital costs and the chance to drive innovation throughout the organisation – but on the downside are the risks to data security and the complexity that comes with supporting a wide range of devices. My conversations with customers and colleagues confirm that these are the issues that are exercising the minds of CXOs considering opening the door to BYOD – data security more than most. So what are the options when it comes to managing and mitigating data security risks? Extend and adapt traditional control systems? Traditionally, networking vendors have employed NAC hardware devices to manage access to corporate infrastructure. The emergence of BYOD has prompted many of these vendors to expand NAC device functionality to provide further profiling and context-aware intelligence – gathering information from the device, the infrastructure and network services before granting or denying access to network services. Although context awareness provides granularity, all restrictions are facilitated by network equipment like switches and routers. In some ways I see this approach as something of a workaround, with potential downsides including a less than slick user experience and knock on effects for productivity. It can work, but it’s not ideal. Use Mobile Device Management to lock BYOD down? A second option is to deploy Mobile Device Management, or MDM, which is a software service that monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. It’s not a new technology. In fact, it’s been around for years, but MDM is a workable solution. It overcomes the challenges of providing end-user convenience while achieving the required enterprise security – in essence it ensures that a line is drawn between mobile work and play. MDM solutions deliver high levels of data encryption, compliance checking and security breach detection. This type of service even protects the enterprise if a device is lost or stolen – data stored on the phone is encrypted and can be remotely erased if necessary. At the same time, MDM provides cloud options with self-service portals so that users can access a quick and hassle-free service. Up to a point, this supports employee satisfaction and helps organisations to attract and retain talent – on top of the wider organisational and cost benefits of BYOD. Visit Logicalis’ blog www.cxounplugged.com 1
  • 2. There is no doubt that MDM simplifies the deployment and management of BYOD infrastructure, but it’s also pretty clear that it is not a perfect solution – that is not so much about its efficacy, but about its likely popularity amongst employees. Go for a hybrid MDM and MAM solution? The issue with MDM as a one-stop BYOD security solution is this – many feel MDM is somewhat invasive and just don’t like the idea that corporate IT is able to access private data. The point is, in a BYOD environment, you can’t dismiss those concerns. In fact, I think those perceptions could seriously undermine user confidence in BYOD – aggressively controlling the entire device, allowing camera disabling, denying access to App Store, as well as locking or erasing data from compromised devices risks making BYOD feel more like ‘buy your own device’ than ‘bring your own device’. It’s hard to see why many employees would be keen to sign up to that kind of arrangement. In my view, that need to balance user satisfaction with the needs of enterprise security, is the main reason Mobile Application Management (MAM) has increasingly been added to the BYOD mix. MAM enables IT departments to control the corporate applications and content deployed to an employee’s device without encroaching upon the employees’ private data – and that is a really important distinction. In fact, MAM is increasingly becoming a preferred approach. But it is worth remembering that MAM and MDM are complementary technologies, since MAM focuses on the software while MDM leverages the hardware. Indeed, MDM vendors are increasingly defining themselves as MobileIT, essentially a combination of MAM and MDM – and this is, at the very least, a solution worth considering. The right balance The key for CXOs seeking to enable a BYOD culture is to find a solution that balances flexibility with control. Any solution which goes too far in limiting or controlling the use of devices bought and paid for by employees themselves is likely to be resented, or even rejected altogether – rendering BYOD dead in the water. On the other hand, realising the potential cost and resource efficiency, innovation and employee satisfaction that BYOD can underpin should never come at the expense of data security. In my opinion, solutions to these challenges are still evolving and, of course, the right choice will depend on the nature of the business – so it is worth exploring all the options in detail. However, given the need to balance flexibility with control, it is not a great surprise to see the tide turning in favour of MDM/MAM or MobileIT – and it is certainly the best, most flexible option available at the moment. Visit Logicalis’ blog www.cxounplugged.com 2
  • 3. About James Tay James Tay, Chief Executive Officer, Logicalis Asia James Tay is the Chief Executive Officer of Logicalis Asia. Prior to Logicalis’ acquisition of the NetStar Group in January 2010, James had held the same position in NetStar. During his 8 years of services with (NetStar, then) Logicalis, he has transformed the Company from a product-focused organisation to one that is centred on Managed Services. An ICT industry veteran, James was President of Sales at EDS PLM in Asia Pacific prior to joining NetStar. During his 16-year tenure at EDS, James held other senior management positions at various levels. He was the Managing Director for Asia, and was directly involved in setting up the EDS offices in China, Indonesia, Malaysia, Singapore, Taiwan and Thailand, as well as establishing distributor networks in Korea and the Philippines. James received his Master’s degree in Engineering Business Management from the University of Warwick, U.K. Visit Logicalis’ blog www.cxounplugged.com 3