SlideShare a Scribd company logo
White Paper

Leveraging BYOD
By Vijay Saradhi, ManageEngine

Sep / 2013
Introduction
With the coming together of PCs and mobile devices, we are witnessing an unprecedented increase in enterprise mobility. Today, mobiles and tablets are ubiquitous in
any work place. Employees access most of their business applications by using mobile
devices. Some industries, such as education, manufacturing, and healthcare, have
responded quite well to this trend, and they allow their employees to access corporate
data by using mobile devices securely.

The Rise of BYOD
To understand the rise of BYOD, we’ll need to consider the following trends:

•

Rise of IT consumerization

•

Enterprise ability in managing mobile technology

Research conducted by Gartner predicts the sale of 1.2 billion smart devices in 2013,
which are bound to create a BYOD wave. According to Gartner, tablets will be the key to
mobile growth and estimates that the rate of purchase of tablets will triple by 53 million
units in 2016. http://www.gartner.com/newsroom/id/2227215
The awareness of technology among employees has risen with the rise in mobile device
usage. Therefore, it’s time for the IT teams to evaluate and understand the potential of
BYOD.

Concerns
With the increase in BYOD, the concerns around it are mounting because of the threats
to data integrity and data availability.
Meanwhile, many BYOD implementations are already experiencing significant problems, including:

Device Audit: One of the primary concerns is device recognition. The IT team needs
to constantly detect devices that enter and exit the company premises. IT administrator
could use network access control to define the security layer in the enterprise network
to accommodate devices based on APIs. This can help in monitoring the users and the

A White Paper: Leveraging BYOD

Page 2
users and the devices they access inside the organization. However, this solution is not
foolproof because device can be isolated from the network without the ability to go
through NAC checks. For example, in manufacturing companies, part time workers may
access information from their own device with the edge network, which can make the
data vulnerable to security attacks.

Risk of Virus/Malware: Using commercial apps and public hot spots to access
emails puts your corporate data vulnerable to virus attacks. Hot spots are present in
various locations, such as coffee bars, hospitals, movie theatres, etc., which might be
vulnerable to security threats. Therefore, it becomes imperative for the IT team to establish stringent security policies.

Adherence to Security Policies: Enterprises will need to monitor carefully the
devices that employees’ carry because of the company data stored on the mobile
devices. If the IT department does not enforce security policies, the employees may willfully disregard those policies and inadvertently cause security incidents.
Therefore, enterprises need to implement and ensure adherence to security policies
without unduly restricting users’ control over their own devices.

A White Paper: Leveraging BYOD

Page 3
Issue of Ownership: In the case of BYOD, there’s a constant tug of war between data
and devices. Devices are employee-owned whereas data is company-owned. The rights
associated with hybrid ownership can complicate BYOD tasks such as restricting access
to official emails or performing a data wipe. In the absence of thorough usage and ownership guidelines, the advantages of BYOD might be completely lost.

Getting 100% from BYOD:
The adage, one size does not fit all applies to BYOD. Each industry has its unique set
of requirements for managing employee-owned mobile devices. A perfectly tailored
BYOD policy can give the best returns for an organization. To ensure that companies
derive the maximum benefit from the BYOD concept, you need to implement a robust
security policy.

User Acceptance: The IT team needs to implement an effective mobile strategy.
Because organizations allow employees to use their own devices, employees need to
agree to the conditions and terms of use imposed by the IT team. The BYOD policy must
list the rights and responsibilities of the employer and the employee, including who is
responsible for data costs.

A White Paper: Leveraging BYOD

Page 4
To lay out an effective policy, the IT staff and legal team understands the pros and cons
of BYOD and work coherently to put the policy suitable to the organization context.

Systematic IT Approval: The IT team will need to create an approval mechanism
to allow or prohibit the employee from accessing corporate data. The IT admin must
ensure that they receive 24 x 7 alerts on employees accessing the data. An advantage
of this approach is the ease with which data can be erased in exceptional cases such as
a theft. 

Stringent Policy Configuration: You will need to apply strict passcode polices
and restrictions to device features and Mobile functionalities such as sharing options,
camera settings, multimedia options, and more. Depending on the industry, configurations need to be tailored so that data can be protected from outside threats. Few of the
polices are data access limitation in accessing documents and mails, support for device
types, approval process for establishing access to office resources, permission to access
reources depending on the employees roles and responsibilities, inactive device management, etc. These are the few polices that lets IT team to minimize the data leakage.

Data Security: To build a security foundation, the IT team has to combine BYOD with
robust mobile device management (MDM) features that can help protect data from outside threats. MDM features such as password policy, data wipe, and profile configuration
can help in maintaining strong data security with maximum protection. Containerization is another solution that helps in segregating enterprise data from personal data.
To ensure that only trusted devices enter the network, you can integrate network
access control and MDM software. The anti-virus license should permit installation on
employee-owned devices.

Group Restrictions: Creating profiles that might enable certain privileges for a specific section of users can help in defining access like whom to what. To monitor data
easily, you can perform segmentation at two levels:

•

Organizational unit levels such as HR, R&D, finance, and marketing

•

Employee level such as contract workers, fulltime, and temporary employees

A White Paper: Leveraging BYOD

Page 5
For instance, in the health care industry, surgeons might want to look at the patient’s
history before they begin any treatment, and the general physician might want to scan
the patient’s health status. In these cases, devices cannot be grouped in the same category. Here, it becomes essential for the IT admin to segregate devices based on the
privileges and allow employees to use devices based on their roles and needs.

Harnessing BYOD: The IT staff cannot stop at implementing security policies. They
must also educate employees on the importance of BYOD and its advantages. It is
important to establish a mutual understanding between the end user and the IT team.
The IT team must create guidelines and educate employees about the BYOD lifecycle,
from self-enrollment to device retirement.

Device Retirement: Organizations need to implement an effective data clearance
process to be followed when employees retire from the company’s services. This will
ensure that there is no data leakage and the company data is secure.

The best balance between failure and success: BYOD
Organizations need to evaluate the pros and cons of mobile technology trends and
leverage them to fit their business framework. This section will briefly cover the driving
forces of BYOD and its benefits.

A White Paper: Leveraging BYOD

Page 6
Higher/Increased Productivity: BYOD helps organizations fully tap their employees’ productivity. With technology that enables anywhere, anytime access to applications
and data technology, conventional 9 to 5 jobs have been replaced with 24 x 7 availability. For instance, business development units are constantly on the move to meet
clients in places like hotels and golf courses to discuss business, and it is of paramount
importance for the sales teams to access their presentations on their mobile devices to
complete their business successfully.

Cost Saving: BYOD reduces investment costs for enterprises by allowing work to
be managed from an employee-owned device. The cost of the voice data is borne by
the employees themselves or is supported by a reimbursement plan by the employer.
Enterprises must implement and enforce a well-defined policy to keep such costs under
control. This for instance can be done by providing VPN connection at the app level.

Work Flexibility: BYOD allows for work flexibility. Employees can access work-related
information and complete tasks anytime, anywhere. With such flexibility, employees
have a better sense of balance between work and life.

Employee Satisfaction: BYOD helps create a sophisticated work culture and an
opportunity to reinforce a mutually beneficial relationship between employer and
employee.

Best Practices:
•

Pre-determine the device types and operating systems to be allowed based on the 		
available expertise.

•

Scrutinize data that the device can access. Create a protocol to protect the data; the 		
app should authenticate the user, encrypt the data, and disallow backups.

•

Enforce stringent security practices, such as passcode policy, anti-virus applications, etc.

• Create data protection policies such as disallowing apps that read data from the device 		
or app that transmits data to cloud, etc.
•

Erase data from lost devices or retire the device and erase the data when the employee 		
leaves the company.

A White Paper: Leveraging BYOD

Page 7
What lies ahead?
Despite the challenges that BYOD presents, it holds the key to the future because more
and more employees rely on their smartphones and tablets for their personal and official work.
BYOD issues like employee privacy and hybrid and device/data ownership continue to
challenge IT team. However, IT can still get the best out of BYOD by framing and implementing robust security policies. In these turbulent times, BYOD comes as a silver lining
for enterprises to generate consistent productivity and run a profitable business.

About Desktop Central:
Desktop Central is a web-based server, desktop, and mobile device management software that helps in managing thousands of servers, desktops, and mobile devices from
a central location. It automates the complete desktop management and mobile device
management life cycle, ranging from a simple system configuration to complex software deployment.
Desktop offers a portfolio of features in Mobile Device Management like Profile Configuration, Security Management, App management, Configurable reports, etc. With
Desktop Central, an IT administrator can manage iOS and Android-based mobile devices
from enrollment to data wipe. For more details, Visit: http://bit.ly/17Pu4Te

About ManageEngine
ManageEngine serves more than 70,000 established and emerging enterprises - customers with IT infrastructures that are far more dynamic, flexible, and elastic than ever
before. The net result is what ManageEngine calls real-time IT. Real-time IT calls for IT to
make the most of today’s game-changing technologies and deliver immediate services
to organizations that are operating at an ever-increasing pace. It compels IT to operate
at the speed of business, leveraging technologies to support new business models and
applications.

A White Paper: Leveraging BYOD

Page 8

More Related Content

What's hot

Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
SPEC INDIA
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
RapidValue
 
MODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOMEMODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOME
myteratak
 
Modernization of NTUC Income
Modernization of NTUC IncomeModernization of NTUC Income
Modernization of NTUC Income
nhainisaini
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
Citrix
 
Managed Print Services
Managed Print ServicesManaged Print Services
Managed Print Services
srini4front
 
Case 1 modernization of ntuc income 2
Case 1 modernization of ntuc income 2Case 1 modernization of ntuc income 2
Case 1 modernization of ntuc income 2
dyadelm
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
MODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOME MODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOME Syeda Tabia
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User Computing
DATAVERSITY
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Citrix
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
niz73
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
Israt Jahan
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
MTG IT Professionals
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
Zulkifflee Sofee
 
Enhance Plant Maintenance with Mobile White Paper
Enhance Plant Maintenance with Mobile White PaperEnhance Plant Maintenance with Mobile White Paper
Enhance Plant Maintenance with Mobile White PaperKevin Harp
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
guestc1bca2
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 

What's hot (20)

Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
MODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOMEMODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOME
 
Modernization of NTUC Income
Modernization of NTUC IncomeModernization of NTUC Income
Modernization of NTUC Income
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
Managed Print Services
Managed Print ServicesManaged Print Services
Managed Print Services
 
Case 1 modernization of ntuc income 2
Case 1 modernization of ntuc income 2Case 1 modernization of ntuc income 2
Case 1 modernization of ntuc income 2
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
MODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOME MODERNIZATION OF NTUC INCOME
MODERNIZATION OF NTUC INCOME
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User Computing
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Modernization of ntuc income
Modernization of ntuc incomeModernization of ntuc income
Modernization of ntuc income
 
Enhance Plant Maintenance with Mobile White Paper
Enhance Plant Maintenance with Mobile White PaperEnhance Plant Maintenance with Mobile White Paper
Enhance Plant Maintenance with Mobile White Paper
 
Ntuc income
Ntuc incomeNtuc income
Ntuc income
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 

Viewers also liked

Desktop Central customer-case-study
Desktop Central customer-case-studyDesktop Central customer-case-study
Desktop Central customer-case-studyManageEngine
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
ManageEngine
 
Applications performance Management For Enterprise Applications
Applications performance Management For Enterprise ApplicationsApplications performance Management For Enterprise Applications
Applications performance Management For Enterprise ApplicationsManageEngine
 
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
ManageEngine
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
ManageEngine
 
Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...
Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...
Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...
ManageEngine
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
ManageEngine
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewManageEngine
 
IT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusIT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk Plus
ManageEngine
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
ManageEngine
 
Desmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIDesmitificando SNMP Parte-II
Desmitificando SNMP Parte-II
ManageEngine
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
ManageEngine
 
Webinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesWebinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service Catalogues
ManageEngine
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
ManageEngine
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
ManageEngine
 
IT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusIT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk Plus
ManageEngine
 
Desmitificando SNMP
Desmitificando SNMPDesmitificando SNMP
Desmitificando SNMP
ManageEngine
 
FCAPS from an ITIL perspective
FCAPS from an ITIL perspective FCAPS from an ITIL perspective
FCAPS from an ITIL perspective
ManageEngine
 
Role of OpManager in event and fault management
Role of OpManager in event and fault managementRole of OpManager in event and fault management
Role of OpManager in event and fault management
ManageEngine
 
ITIL for Dummies
ITIL for DummiesITIL for Dummies
ITIL for Dummies
Stijn Wijndaele
 

Viewers also liked (20)

Desktop Central customer-case-study
Desktop Central customer-case-studyDesktop Central customer-case-study
Desktop Central customer-case-study
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Applications performance Management For Enterprise Applications
Applications performance Management For Enterprise ApplicationsApplications performance Management For Enterprise Applications
Applications performance Management For Enterprise Applications
 
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...
Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...
Manual to Automatic Desktop Management for VUB using ManageEngine Desktop Cen...
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
 
An Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An OverviewAn Integrated Approach to Manage IT Network Traffic - An Overview
An Integrated Approach to Manage IT Network Traffic - An Overview
 
IT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusIT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk Plus
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Desmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIDesmitificando SNMP Parte-II
Desmitificando SNMP Parte-II
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
Webinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesWebinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service Catalogues
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
 
IT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusIT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk Plus
 
Desmitificando SNMP
Desmitificando SNMPDesmitificando SNMP
Desmitificando SNMP
 
FCAPS from an ITIL perspective
FCAPS from an ITIL perspective FCAPS from an ITIL perspective
FCAPS from an ITIL perspective
 
Role of OpManager in event and fault management
Role of OpManager in event and fault managementRole of OpManager in event and fault management
Role of OpManager in event and fault management
 
ITIL for Dummies
ITIL for DummiesITIL for Dummies
ITIL for Dummies
 

Similar to Leveraging byod

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
DMIMarketing
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Mobiloitte
 
BYOD
BYODBYOD
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Martin Perry
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
JumpCloud
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
NEORIS
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
team-abr
 
Byod
ByodByod
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
CloudUniversity
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
RapidScale
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 

Similar to Leveraging byod (20)

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
BYOD
BYODBYOD
BYOD
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Byod
ByodByod
Byod
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 

More from ManageEngine

IT security : Keep calm and monitor PowerShell
IT security : Keep calm and monitor PowerShellIT security : Keep calm and monitor PowerShell
IT security : Keep calm and monitor PowerShell
ManageEngine
 
IT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack toolIT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack tool
ManageEngine
 
There's more than one way to get admin privileges
There's more than one way to get admin privilegesThere's more than one way to get admin privileges
There's more than one way to get admin privileges
ManageEngine
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy
ManageEngine
 
ManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine's Patch Manager Plus
ManageEngine's Patch Manager Plus
ManageEngine
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngine
ManageEngine
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk Plus
ManageEngine
 
IT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusIT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk Plus
ManageEngine
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
ManageEngine
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine
 
VMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual EnvironmentVMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual Environment
ManageEngine
 
OpStor - A multi vendor storage resource management and capacity forecasting ...
OpStor - A multi vendor storage resource management and capacity forecasting ...OpStor - A multi vendor storage resource management and capacity forecasting ...
OpStor - A multi vendor storage resource management and capacity forecasting ...
ManageEngine
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
ManageEngine
 

More from ManageEngine (13)

IT security : Keep calm and monitor PowerShell
IT security : Keep calm and monitor PowerShellIT security : Keep calm and monitor PowerShell
IT security : Keep calm and monitor PowerShell
 
IT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack toolIT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack tool
 
There's more than one way to get admin privileges
There's more than one way to get admin privilegesThere's more than one way to get admin privileges
There's more than one way to get admin privileges
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy
 
ManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine's Patch Manager Plus
ManageEngine's Patch Manager Plus
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngine
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk Plus
 
IT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusIT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk Plus
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
 
VMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual EnvironmentVMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual Environment
 
OpStor - A multi vendor storage resource management and capacity forecasting ...
OpStor - A multi vendor storage resource management and capacity forecasting ...OpStor - A multi vendor storage resource management and capacity forecasting ...
OpStor - A multi vendor storage resource management and capacity forecasting ...
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Leveraging byod

  • 1. White Paper Leveraging BYOD By Vijay Saradhi, ManageEngine Sep / 2013
  • 2. Introduction With the coming together of PCs and mobile devices, we are witnessing an unprecedented increase in enterprise mobility. Today, mobiles and tablets are ubiquitous in any work place. Employees access most of their business applications by using mobile devices. Some industries, such as education, manufacturing, and healthcare, have responded quite well to this trend, and they allow their employees to access corporate data by using mobile devices securely. The Rise of BYOD To understand the rise of BYOD, we’ll need to consider the following trends: • Rise of IT consumerization • Enterprise ability in managing mobile technology Research conducted by Gartner predicts the sale of 1.2 billion smart devices in 2013, which are bound to create a BYOD wave. According to Gartner, tablets will be the key to mobile growth and estimates that the rate of purchase of tablets will triple by 53 million units in 2016. http://www.gartner.com/newsroom/id/2227215 The awareness of technology among employees has risen with the rise in mobile device usage. Therefore, it’s time for the IT teams to evaluate and understand the potential of BYOD. Concerns With the increase in BYOD, the concerns around it are mounting because of the threats to data integrity and data availability. Meanwhile, many BYOD implementations are already experiencing significant problems, including: Device Audit: One of the primary concerns is device recognition. The IT team needs to constantly detect devices that enter and exit the company premises. IT administrator could use network access control to define the security layer in the enterprise network to accommodate devices based on APIs. This can help in monitoring the users and the A White Paper: Leveraging BYOD Page 2
  • 3. users and the devices they access inside the organization. However, this solution is not foolproof because device can be isolated from the network without the ability to go through NAC checks. For example, in manufacturing companies, part time workers may access information from their own device with the edge network, which can make the data vulnerable to security attacks. Risk of Virus/Malware: Using commercial apps and public hot spots to access emails puts your corporate data vulnerable to virus attacks. Hot spots are present in various locations, such as coffee bars, hospitals, movie theatres, etc., which might be vulnerable to security threats. Therefore, it becomes imperative for the IT team to establish stringent security policies. Adherence to Security Policies: Enterprises will need to monitor carefully the devices that employees’ carry because of the company data stored on the mobile devices. If the IT department does not enforce security policies, the employees may willfully disregard those policies and inadvertently cause security incidents. Therefore, enterprises need to implement and ensure adherence to security policies without unduly restricting users’ control over their own devices. A White Paper: Leveraging BYOD Page 3
  • 4. Issue of Ownership: In the case of BYOD, there’s a constant tug of war between data and devices. Devices are employee-owned whereas data is company-owned. The rights associated with hybrid ownership can complicate BYOD tasks such as restricting access to official emails or performing a data wipe. In the absence of thorough usage and ownership guidelines, the advantages of BYOD might be completely lost. Getting 100% from BYOD: The adage, one size does not fit all applies to BYOD. Each industry has its unique set of requirements for managing employee-owned mobile devices. A perfectly tailored BYOD policy can give the best returns for an organization. To ensure that companies derive the maximum benefit from the BYOD concept, you need to implement a robust security policy. User Acceptance: The IT team needs to implement an effective mobile strategy. Because organizations allow employees to use their own devices, employees need to agree to the conditions and terms of use imposed by the IT team. The BYOD policy must list the rights and responsibilities of the employer and the employee, including who is responsible for data costs. A White Paper: Leveraging BYOD Page 4
  • 5. To lay out an effective policy, the IT staff and legal team understands the pros and cons of BYOD and work coherently to put the policy suitable to the organization context. Systematic IT Approval: The IT team will need to create an approval mechanism to allow or prohibit the employee from accessing corporate data. The IT admin must ensure that they receive 24 x 7 alerts on employees accessing the data. An advantage of this approach is the ease with which data can be erased in exceptional cases such as a theft.  Stringent Policy Configuration: You will need to apply strict passcode polices and restrictions to device features and Mobile functionalities such as sharing options, camera settings, multimedia options, and more. Depending on the industry, configurations need to be tailored so that data can be protected from outside threats. Few of the polices are data access limitation in accessing documents and mails, support for device types, approval process for establishing access to office resources, permission to access reources depending on the employees roles and responsibilities, inactive device management, etc. These are the few polices that lets IT team to minimize the data leakage. Data Security: To build a security foundation, the IT team has to combine BYOD with robust mobile device management (MDM) features that can help protect data from outside threats. MDM features such as password policy, data wipe, and profile configuration can help in maintaining strong data security with maximum protection. Containerization is another solution that helps in segregating enterprise data from personal data. To ensure that only trusted devices enter the network, you can integrate network access control and MDM software. The anti-virus license should permit installation on employee-owned devices. Group Restrictions: Creating profiles that might enable certain privileges for a specific section of users can help in defining access like whom to what. To monitor data easily, you can perform segmentation at two levels: • Organizational unit levels such as HR, R&D, finance, and marketing • Employee level such as contract workers, fulltime, and temporary employees A White Paper: Leveraging BYOD Page 5
  • 6. For instance, in the health care industry, surgeons might want to look at the patient’s history before they begin any treatment, and the general physician might want to scan the patient’s health status. In these cases, devices cannot be grouped in the same category. Here, it becomes essential for the IT admin to segregate devices based on the privileges and allow employees to use devices based on their roles and needs. Harnessing BYOD: The IT staff cannot stop at implementing security policies. They must also educate employees on the importance of BYOD and its advantages. It is important to establish a mutual understanding between the end user and the IT team. The IT team must create guidelines and educate employees about the BYOD lifecycle, from self-enrollment to device retirement. Device Retirement: Organizations need to implement an effective data clearance process to be followed when employees retire from the company’s services. This will ensure that there is no data leakage and the company data is secure. The best balance between failure and success: BYOD Organizations need to evaluate the pros and cons of mobile technology trends and leverage them to fit their business framework. This section will briefly cover the driving forces of BYOD and its benefits. A White Paper: Leveraging BYOD Page 6
  • 7. Higher/Increased Productivity: BYOD helps organizations fully tap their employees’ productivity. With technology that enables anywhere, anytime access to applications and data technology, conventional 9 to 5 jobs have been replaced with 24 x 7 availability. For instance, business development units are constantly on the move to meet clients in places like hotels and golf courses to discuss business, and it is of paramount importance for the sales teams to access their presentations on their mobile devices to complete their business successfully. Cost Saving: BYOD reduces investment costs for enterprises by allowing work to be managed from an employee-owned device. The cost of the voice data is borne by the employees themselves or is supported by a reimbursement plan by the employer. Enterprises must implement and enforce a well-defined policy to keep such costs under control. This for instance can be done by providing VPN connection at the app level. Work Flexibility: BYOD allows for work flexibility. Employees can access work-related information and complete tasks anytime, anywhere. With such flexibility, employees have a better sense of balance between work and life. Employee Satisfaction: BYOD helps create a sophisticated work culture and an opportunity to reinforce a mutually beneficial relationship between employer and employee. Best Practices: • Pre-determine the device types and operating systems to be allowed based on the available expertise. • Scrutinize data that the device can access. Create a protocol to protect the data; the app should authenticate the user, encrypt the data, and disallow backups. • Enforce stringent security practices, such as passcode policy, anti-virus applications, etc. • Create data protection policies such as disallowing apps that read data from the device or app that transmits data to cloud, etc. • Erase data from lost devices or retire the device and erase the data when the employee leaves the company. A White Paper: Leveraging BYOD Page 7
  • 8. What lies ahead? Despite the challenges that BYOD presents, it holds the key to the future because more and more employees rely on their smartphones and tablets for their personal and official work. BYOD issues like employee privacy and hybrid and device/data ownership continue to challenge IT team. However, IT can still get the best out of BYOD by framing and implementing robust security policies. In these turbulent times, BYOD comes as a silver lining for enterprises to generate consistent productivity and run a profitable business. About Desktop Central: Desktop Central is a web-based server, desktop, and mobile device management software that helps in managing thousands of servers, desktops, and mobile devices from a central location. It automates the complete desktop management and mobile device management life cycle, ranging from a simple system configuration to complex software deployment. Desktop offers a portfolio of features in Mobile Device Management like Profile Configuration, Security Management, App management, Configurable reports, etc. With Desktop Central, an IT administrator can manage iOS and Android-based mobile devices from enrollment to data wipe. For more details, Visit: http://bit.ly/17Pu4Te About ManageEngine ManageEngine serves more than 70,000 established and emerging enterprises - customers with IT infrastructures that are far more dynamic, flexible, and elastic than ever before. The net result is what ManageEngine calls real-time IT. Real-time IT calls for IT to make the most of today’s game-changing technologies and deliver immediate services to organizations that are operating at an ever-increasing pace. It compels IT to operate at the speed of business, leveraging technologies to support new business models and applications. A White Paper: Leveraging BYOD Page 8