programming4us
programming4us
MOBILE

Consumerization Strategies (Part 2)

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire

Back up BYOD policies with security tools

It’s crucial to create strict BYOD policies that limit the risks associated with consumerization, but that can’t be your only course of action. After all, if you give your employees free rein on your network with only mere suggestions to contain their activities, many users will simply do what they think is right. This is not an option for companies where there is a risk of significant data leakage via mobile devices.

The degree of security you need depends on how mobile devices are being used at your company

The degree of security you need depends on how mobile devices are being used at your company

The degree of security you need depends on how mobile devices are being used at your company. You can look at it from a general perspective, but it doesn’t hurt to dig a little deeper into individual departments and roles. A field service technician’s device, for example, doesn’t hold too much information, Hafner says. “It’s got a couple of drawings on how the pieces of equipment he might repair have to be put back together, things like that. If it gets lost, I just wipe the device and I don’t really care. You have to determine what it is that’s going to be on there and the level of risk.”

But for employees who need access to internal company resources in order to do their job from remote locations, businesses can implement solutions like virtual desktops or thin clients on tablets. With this approach, employees can “look at information that is stored back on the data center, like you would with a virtual desktop that you might have,  but there’s really nothing stored on the device there at all,” says Hafner. He warns though that this type of solution relies heavily on connectivity, so if any of your employees are working in regions with poor reception, this might not be an option.

DeBeasi also suggests that companies consider MDM (mobile device management) solutions, which provide more control over devices. Companies can actually monitor devices as endpoints and make sure they aren’t accessing sensitive data or, worse, downloading it or transmitting it elsewhere. MDM solutions help companies allow or deny network connections as well as just have a better view into network activity from a mobile perspective.

mobile device management solutions

Mobile device management solutions

Another potential solution that both Hafner and DeBeasi recommend when implementing BYOD policies is containerization. Containerization allows you to set aside some storage for enterprise-only apps, which blocks access to or from other applications on the device. “For example, you’ve got your business app on there that does whatever it needs to do and they’ve loaded down 50 games or apps,” says Hafner. These are isolated from each other, so there’s no way for you to share a file from the business app with one of the other apps or the other way around.” This also prevents potential malware from seemingly trustworthy applications from affecting any business data that’s stored on the device.

DeBeasi warns that “as you go from Exchange ActiveSync, to MDM, to containers, the IT organization gets more and more controls, but it becomes a little more intrusive to the user.” There is a trade-off between control and user experience that should be taken into consideration and is a “balance that enterprises have to make,” he says. After all, the main point of implementing a BYOD policy is to allow employees to use their devices safely and effectively to increase their productivity.

Continued growth of consumerization

According to Hafner, consumerization should continue to increase as employees are considering or already bringing their own PCs, in addition to smartphones and tablets, into the workplace. But he doesn’t necessarily see a time, in the next five years at least, where BYOD replaces everything. And the main reason for that is that some employees simply don’t want the responsibility of keeping up with technology and choosing their own devices.

You have to make sure you have control over your company’s data and resources, but still give employees what they need

You have to make sure you have control over your company’s data and resources, but still give employees what they need

“You’re trying to run a business, and if the person is not technology literate, and depending on what the job is, they might depend on the organization to not only supply the devices, but more importantly to support devices,” says Hafner. “When we’re helping people put together BYOD strategies for their organizations, we tell them that you have an opt-in and an opt-out plan for people that don’t want to do these things, because you can’t necessarily force them.”

However, Hafner doesn’t rule out a future where companies may decide to create new positions or hire new employees on the condition that as a part of their contract of employment, they must “always have a PC and a smartphone that’s less than two years old” and the company may offer compensation for usage. But one thing is undeniable: Consumerization is here to stay, and BYOD policies will be more important than ever. You have to make sure you have control over your company’s data and resources, but still give employees what they need.

Other  
 
Youtube channel
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
programming4us
 
 
programming4us