What is bring your own device




















It also implements network access control or NAC. This Makes it easier to control access to corporate networks and resources. Options include:. Organizations must understand their own requirements for data protection. This is especially important in regulated industries where there are compliance requirements. A compiled risk profile may help in determining key parts of the BYOD policy.

Situations, where compliance requirements and international deployment are part of the equation, have high BYOD risk levels. Employees should never have access to more data than they need. Your corporate BYOD policy should always stipulate the importance of keeping software up to date. Employees must update operating systems, browsers, and other applications as frequently as possible. This ensures they always have the most recent security patches.

Staying up-to-date guarantees If an employee leaves the company, their devices will be adequately wiped of corporate data. Every company should adopt a stringent device tracking policy. This ensures that they will be constantly aware of the location of all company devices when they are currently in use or not.

Remote wipe refers to the concept of deleting data from a device remotely. This includes overwriting stored data to avoid any kind of forensic recovery and ultimately returning the device to its original factory settings.

This ensures that no one will ever be able to access the data that was once on the machine. This is particularly important to be able to do if an employee were to lose their device and not have it available to wipe clean.

If you decide to implement a BYOD policy for your company, consult with an expert to make sure you cover everything. Enter your email below to begin the process of setting up a meeting with one of our product specialists. Increased employee satisfaction: Employees are happier with their jobs and more likely to stay with the company as a result of the flexible work arrangements.

Increased employee effectiveness: Because employees are more comfortable with their own devices, they can get work done faster and more effectively. Accessing unsecured Wi-Fi: Employees will undoubtedly use their devices off the clock.

As such, they are likely to access unsecured Wi-Fi connections at stores, airports, coffee shops, and possibly their own homes. Unsecured networks can make it easy for hackers to access company data.

Possible IT department cost increases: If the IT department decides that they will offer support to personal devices, this could cause costs to increase a bit. Lack of security on personal devices: The employees may not have the proper antivirus or firewall software installed on their devices.

Possible data breaches: Your company is at an increased risk for data breaches as a result of lost or stolen personal devices. Employees who leave the company may also put you at risk for a data breach. Hardware When a corporation provides devices to employees, the company gets complete control over the specific Hardware choice.

Malware An employee starts to use their own phone or computer in the workplace, not much is known about the device. It needs to include: Types of approved devices — Microsoft, Apple, etc. Device tracing All companies should adopt a strict device tracking policy. This will help them to constantly be aware of the whereabouts of all company devices whether in use or not.

It is also good to implement a surveillance system capable of monitoring all devices entering and leaving company premises. Visitors' devices should also be included in the surveillance system. Key benefits to operating a BYOD strategy in an organization are discussed below: Technology familiarity People mostly tend to be familiar with their own devices.

For instance, Apple fans are very familiar with Apple technology and Windows fans are good with devices running on Windows operating systems. Employees could actually get frustrated while trying to get used to a totally different device. This issue is eradicated by Bring Your Own Device, which allows employees to work using their own personalized devices, which meet all their own needs and enables employees to be perfectly competent in their jobs.

Flexibility Bring Your Own Device allowing employees in an organization to use just one device prevents them from traveling with several devices in order to satisfy their work and home needs, as the one device will fulfill both. With employees having access to all of the data they need anywhere they want, they will be able to work normally from anywhere just as how they function in the office. These employees do not get disturbed by the strict rules that they have to adhere to when using company property.

Bring Your Own Device thus allows greater freedom to the employees. Reduced costs Companies using BYOD can actually save huge amounts of money as they don't have to purchase costly devices for their employees to be able to do eLearning, for instance. Eventually, wastage and breakages could also be reduced since the employees ensure to take better care of their own equipment than company-owned devices as any repair costs could become the employee's burden.

Increased productivity and innovation Bring Your Own Device helps create a positive correlation between the comfort-level of employees and their productivity. By using their own devices, employees get comfortable and hence master their use.

These devices are mostly available with the newest technologies, thus proving to be beneficial to the enterprise. Allowing employees to utilize BYOD in the workplace could result in a number of security risks associated with: Allowing employees to utilize BYOD in the workplace could result in a number of security risks associated with: Lack of antivirus or firewall software When utilizing their own devices in the workplace, employees should always be encouraged to update firewall and antivirus software regularly.

Failing to do so can actually create weak networks and holes in systems. Accessing unsecured Wi-Fi Employees generally use their devices outside the workplace and are hence likely to access unsecured Wi-Fi connections at coffee shops, stores, airports, or even their own home. Networks that are not secured can actually provide hackers with easy access to the company's networks or systems. Stolen or lost devices If devices with company data are lost, misplaced or stolen, this could help unwanted third-party individuals to obtain access to vital information of your business.

This mostly takes place when devices are not secured with passcodes or passwords. People leaving the company Ex-employees could gain unauthorized access to systems after they abruptly leave the company.

This happens because you may not have the time to wipe devices clean of company information and passwords when employees suddenly decide to quit. Insurance Implications of BYOD It is possible for business data to become vulnerable to hackers despite the fact that the best security practices, measures, and policies are in place.

Securing a BYOD program can take several different forms, involving varied types of technologies and policies. How to Establish an Effective BYOD Policy If you have an outdated policy, or if you are in the process of developing a corporate Bring Your Own Device policy, or yet to develop a policy, then consider the tips given below in order to address IT service, application use, security, and several other components: Specify the devices that will be permitted Generally, people who had a blackberry used the same device for work.

However, employees are now pampered with a wide variety of devices ranging from iOS-based mobiles to Android phones. You will have to clarify what devices are acceptable by the enterprise, and what devices can be used. Set up a firm security policy for all devices that enter the premises Device users usually refuse to move to lock screens and passwords on their personal devices.

They hurdle towards the ease of access to the content and the functions on their device. This indeed is not a very valid complaint.

A lot of sensitive information can be accessed once phones and other devices are connected to the corporate servers. If employees desire to adopt the BYOD initiative, they will have to be willing to configure their devices with strong passwords for protection. A lengthy alphabetical password needs to be placed instead of just a simple four-digit one.

Define a clear service policy for devices under BYOD criteria When it comes to resolving problems and questions about employees' personal devices, there are indeed a number of boundaries that the management will have to set.

To implement this, policy-makers will have to answer the questions like: What will be the policies for support on personally owned applications? What support will be provided for devices that are damaged? Will you restrict Helpdesk to ticketing problems with calendaring, email, and other personal information management-type applications? Clear communication should be given on who owns what apps and data Questions must be asked as to whether the BYOD policy that is developed will permit the wiping of the entire device that is brought into the network.

If so, employees will have to be provided with distinct guidance on how to secure their devices and also back up the information in order to restore it once the device is replaced or retrieved.

Join your peers for the unveiling of the latest insights at Gartner conferences. Expert insights and strategies to address your priorities and solve your most pressing challenges.

Information Technology Gartner Glossary. Related Content Webinar. Sorry, No data match for your criteria. Please refine your filters to display data. Related Terms Business Technologist. Digital Assets.



0コメント

  • 1000 / 1000