5 steps to successful byod implementation

29
BYOD Improves Workplace Productivity But at What Cost?

Upload: jumpcloud

Post on 17-Feb-2017

223 views

Category:

Business


0 download

TRANSCRIPT

BYOD Improves Workplace ProductivityBut at What Cost?

The evolution of mobile computing devices has transformed the way we live and work.

Many organizations now implement “bring your own device” (BYOD) policies.

From laptops to tablets and smartphones, users have been set free from their desks.

The workforce can always be connected, through devices both personal and professional

The Pros and Cons of:Bring Your Own Device

Team members are always reachable on their work devices

A recent study links BYOD to increased efficiency and productivity.

Less investment in devices means lower cost to the organization

THE PROS

So much access on so many devices means increased security risk

Less employer control over user access and device applications

Higher device diversity can lead to infrastructure challenges

THE CONS

Q: Do the pros of BYOD outweigh the cons for employers?

PROS

CONS

Q: Do the pros of BYOD outweigh the cons for employers?

A: Of course! PROS

CONS

Gartner predicts that almost half of employers will require employees to use BYOD devices by 2017. Progress stops for no one especially when it comes to new technology.

How to to Manage BYOD Workplaces as Securely as Possible

Create a BYOD PolicyOnly 38% of IT departments have implemented a formal BYOD policy (SANS Institute)

STEP 1:

“The gap between BYOD use and BYOD policies is both staggering and frightening.”

Alan Shimel,CEO at The CISO Group

Questions to Help Determine BYOD Policy:

Are all devices allowed or only certain types and models?

Should all devices in use have to be pre-registered?

What restrictions on access, if any, are there?

Enforce Your BYOD PolicySTEP 2:

The Honor System doesn’t offer much in the way of oversight or enforcement.

The Pro-Active Approach is to use a tool such as a mobile device manager (MDM).

Just install it as an agent on a user’s device.

The MDM automatically enforces policies that you’ve defined on devices and in apps.

And you have access to info on device usage and data storage/transfer.

Teach Your BYOD PolicySTEP 3:

A BYOD policy educates employees on the What, How and Why.

Why “The Why”?

Employees tend to view these policies as arbitrary. They must understand that these policies help achieve a worthy goal.

Put a “Breach Plan” in PlaceSTEP 4:

“Hope for the best,plan for the worst.”

Lee Child,

When device and network security is compromised, having an action plan in place is what separates the safe from the sorry.

Have a checklist and make sure key players know what is expected of them.

With Good Management and Security Practices, The Benefits of BYOD Outweigh Risks

BYOD usage has led to productivity gains and can make your team more responsive.

In an era of “always on”, BYOD lets your organization be always on too.

Security risks can be avoided with proactive BYOD policy and planning.

an enticing opportunity for increased productivity and efficiency.

BYOD:

Check out our entire eBook: The Guide to Doing More Faster. Now with IT Control

In this eBook, thought leaders Gene Kim (author and DevOps evangelist), Rajat Bhargava (CEO JumpCloud), Ben Kepes (Forbes contributor), Alan Shimel (DevOps.com Executive Editor) discuss actionable steps for how modern IT teams build decentralization into their organization while maximizing the security that their IT team needs to keep their organization safe.