SlideShare a Scribd company logo
BYOD

Implementation and Security Issues

Presented By:
Harsh Kishore Mishra
M.Tech. Cyber Security I Sem.
Central University of Punjab, Bathinda
Contents
What is BYOD ?
BYOD Trends
Advantages of BYOD

Issues in BYOD
BYOD Security and Policies
Conclusion
What is BYOD ?


BYOD was mentioned in a paper by Ballagas et
al., at UBICOMP 2005.



First entered in 2009, courtesy of Intel.



The emerging trend in Information technology &
corporate world.



It is the policy of permitting employees to bring
personally owned mobile devices.
BYOD Trends


BYOD is making significant inroads in the business world.



75% of employees in high growth markets such as Brazil
and Russia and 44% in developed markets are already
using it*.



88% of IT leaders see BYOD growth and 76% consider it
extremely positive**.



44% of job seekers view an organization more positively if
it supports their device***.
*http://www.techrepublic.com/blog/10-things/10-myths-of-byod-in-theenterprise/
**A. Scarfò, New security perspectives around BYOD, IEEE 978-0-7695-4842-5/12, 2012
***Cas ey, K evi n (19 November 2012). " Ris ks Your BYOD Policy Must Addres s "
Advantages of BYOD


Increased Productivity: User being more
comfortable with their personal device.



Lower Cost to the Company: No devices cost to
company, employee uses own device.



New Cutting edge Technology: Frequent and
faster upgrades than the devices of company.



Attract and retain talent: Using personal devices
attracts talent.
Issues in BYOD


Security Issues



Privacy Issues



Infrastructure Issues



Support Issues



Device Control Issues
Security and Policies


Automate enforcement of access policy.



Automatically detect and mitigate web-based
threats.



Unifying policy definition on all networks.



Protect the IT infrastructure.



Ensure privacy of the information.
… contd.


Identify the risk elements.



Form a committee to embrace BYOD and
understand the risks.



Decide how to enforce policies for devices
connecting to your network.



Evaluate, Implement & reassess solutions
Conclusion


Business is embracing BYOD for its flexibility
and cost savings.



It improves employees productivity and reduces

costs.


Makes the company look like a flexible and
attractive employer.



BYOD policy should be enforceable and
Thank You

More Related Content

What's hot

Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
dougfarre
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
Data Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Android security
Android securityAndroid security
Android security
Mobile Rtpl
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
Quick Heal Technologies Ltd.
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity Management
Gigya
 
IT Risk Assessment
IT Risk AssessmentIT Risk Assessment
IT Risk Assessment
Banyong Jandragholica
 
Information security
Information securityInformation security
Information security
AlaaMahmoud108
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
John Rhoton
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 

What's hot (20)

Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Android security
Android securityAndroid security
Android security
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity Management
 
IT Risk Assessment
IT Risk AssessmentIT Risk Assessment
IT Risk Assessment
 
Information security
Information securityInformation security
Information security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 

Viewers also liked

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
SunnyhillsSchool
 
BYOD
BYODBYOD
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
Bitglass
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
Liceo Europa Unita
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
Liceo Europa Unita
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
Switchup srl
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
Carmelina Maurizio
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Clever Consulting
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
paolarduini
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
HEC Paris
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
CLDEM
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
AvocatsMathias
 
BYOD
BYOD BYOD
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Microsoft Technet France
 

Viewers also liked (19)

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
BYOD
BYODBYOD
BYOD
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Basında Bugün Göztepe
Basında Bugün GöztepeBasında Bugün Göztepe
Basında Bugün Göztepe
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
BYOD
BYOD BYOD
BYOD
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
 

Similar to BYOD: Bring Your Own Device Implementation and Security Issues

BYOD
BYODBYOD
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Vishrut Shukla
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
Ravi namboori
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
JumpCloud
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Martin Perry
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
ManageEngine
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
Melissa Andrews
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
team-abr
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
Softweb Solutions
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
Merry D'souza
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
NEORIS
 
Byod
ByodByod
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
Daniel J Delaney
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
Vishwa Raj
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
skumartarget
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
Linson Kolanchery
 

Similar to BYOD: Bring Your Own Device Implementation and Security Issues (20)

BYOD
BYODBYOD
BYOD
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Byod
ByodByod
Byod
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 

More from Harsh Kishore Mishra

Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Harsh Kishore Mishra
 
Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
Harsh Kishore Mishra
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
Harsh Kishore Mishra
 
Big data
Big dataBig data
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyHarsh Kishore Mishra
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
Harsh Kishore Mishra
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
Harsh Kishore Mishra
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
Harsh Kishore Mishra
 

More from Harsh Kishore Mishra (12)

Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Big data
Big dataBig data
Big data
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
 
Windows 7 Versions Features
Windows 7 Versions FeaturesWindows 7 Versions Features
Windows 7 Versions Features
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
 
Network security
Network securityNetwork security
Network security
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

BYOD: Bring Your Own Device Implementation and Security Issues

  • 1. BYOD Implementation and Security Issues Presented By: Harsh Kishore Mishra M.Tech. Cyber Security I Sem. Central University of Punjab, Bathinda
  • 2. Contents What is BYOD ? BYOD Trends Advantages of BYOD Issues in BYOD BYOD Security and Policies Conclusion
  • 3. What is BYOD ?  BYOD was mentioned in a paper by Ballagas et al., at UBICOMP 2005.  First entered in 2009, courtesy of Intel.  The emerging trend in Information technology & corporate world.  It is the policy of permitting employees to bring personally owned mobile devices.
  • 4. BYOD Trends  BYOD is making significant inroads in the business world.  75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets are already using it*.  88% of IT leaders see BYOD growth and 76% consider it extremely positive**.  44% of job seekers view an organization more positively if it supports their device***. *http://www.techrepublic.com/blog/10-things/10-myths-of-byod-in-theenterprise/ **A. Scarfò, New security perspectives around BYOD, IEEE 978-0-7695-4842-5/12, 2012 ***Cas ey, K evi n (19 November 2012). " Ris ks Your BYOD Policy Must Addres s "
  • 5. Advantages of BYOD  Increased Productivity: User being more comfortable with their personal device.  Lower Cost to the Company: No devices cost to company, employee uses own device.  New Cutting edge Technology: Frequent and faster upgrades than the devices of company.  Attract and retain talent: Using personal devices attracts talent.
  • 6. Issues in BYOD  Security Issues  Privacy Issues  Infrastructure Issues  Support Issues  Device Control Issues
  • 7. Security and Policies  Automate enforcement of access policy.  Automatically detect and mitigate web-based threats.  Unifying policy definition on all networks.  Protect the IT infrastructure.  Ensure privacy of the information.
  • 8. … contd.  Identify the risk elements.  Form a committee to embrace BYOD and understand the risks.  Decide how to enforce policies for devices connecting to your network.  Evaluate, Implement & reassess solutions
  • 9. Conclusion  Business is embracing BYOD for its flexibility and cost savings.  It improves employees productivity and reduces costs.  Makes the company look like a flexible and attractive employer.  BYOD policy should be enforceable and