5 steps to successful byod implementation
TRANSCRIPT
Many organizations now implement “bring your own device” (BYOD) policies.
From laptops to tablets and smartphones, users have been set free from their desks.
The workforce can always be connected, through devices both personal and professional
Team members are always reachable on their work devices
A recent study links BYOD to increased efficiency and productivity.
Less investment in devices means lower cost to the organization
THE PROS
So much access on so many devices means increased security risk
Less employer control over user access and device applications
Higher device diversity can lead to infrastructure challenges
THE CONS
Gartner predicts that almost half of employers will require employees to use BYOD devices by 2017. Progress stops for no one especially when it comes to new technology.
Create a BYOD PolicyOnly 38% of IT departments have implemented a formal BYOD policy (SANS Institute)
STEP 1:
“The gap between BYOD use and BYOD policies is both staggering and frightening.”
Alan Shimel,CEO at The CISO Group
Questions to Help Determine BYOD Policy:
Are all devices allowed or only certain types and models?
Should all devices in use have to be pre-registered?
What restrictions on access, if any, are there?
The Honor System doesn’t offer much in the way of oversight or enforcement.
The Pro-Active Approach is to use a tool such as a mobile device manager (MDM).
Just install it as an agent on a user’s device.
The MDM automatically enforces policies that you’ve defined on devices and in apps.
And you have access to info on device usage and data storage/transfer.
Employees tend to view these policies as arbitrary. They must understand that these policies help achieve a worthy goal.
When device and network security is compromised, having an action plan in place is what separates the safe from the sorry.
Check out our entire eBook: The Guide to Doing More Faster. Now with IT Control
In this eBook, thought leaders Gene Kim (author and DevOps evangelist), Rajat Bhargava (CEO JumpCloud), Ben Kepes (Forbes contributor), Alan Shimel (DevOps.com Executive Editor) discuss actionable steps for how modern IT teams build decentralization into their organization while maximizing the security that their IT team needs to keep their organization safe.