1) The document discusses bringing your own device (BYOD) trends in enterprises and outlines four steps to enabling secure BYOD networks.
2) It provides statistics on growing smartphone and tablet adoption and usage in businesses.
3) The four steps outlined to enable secure BYOD are: provide a safe, device-agnostic connection everywhere; deliver secure, consistent authentication, authorization and access; protect the user, their device and data and the network, apps and data; and simply manage the user, device, their apps and access.
5. The BYOD balance
Private Secure
Differentiated Compliant
Personalized Users Corporate Authorized
“At the heart of most BYOD plans is the assumption that users are willing to give up
some level of control over their personal devices in exchange for access to
corporate resources, such as networking and email. The extent to which users and
companies may agree on the compromise will vary.” – Gartner, Oct 2011
6. BYOD Demands and Challenges
Any Device Any Location Any Application
Personal devices used for Anytime, anywhere mobile Users download unknown
work remote access or un- / ill-secured apps
Work devices used for Users with multiple devices Users access and store
personal activities data from personal and
business apps
Multiple device types and
service providers