Welcome!

Open Source Cloud Authors: Liz McMillan, Pat Romanski, Elizabeth White, JP Morgenthal, Jeev Trika

Blog Feed Post

10 Tips for Implementing BYOD

As IT becomes more and more personal with the re-invention of smartphones and tablet computers, device management increasingly becomes an issue in organizations. We have covered some important aspects of BYOD policy in our blog, discussing pros and cons of BYOD and today we want to share with you a list of tips from various sources.

Tip #1 – Face the Inevitability of BYOD – and Prepare for It


“70% of small businesses recently surveyed said that BYOD was inevitability at their firms, because so many employees were demanding it…”


Four BYOD Challenges Small Businesses Face

 

 

Tip #2 – Determine if BYOD is Appropriate for Your Business


“Employees want to choose the same type of device they’ve always used. The way to give the greatest choice is through a BYOD program. This can be good for industries that are very competitive for the brightest employees, such as law firms. It’s an extra perk.


Also, companies with employees that need a phone maybe 20 percent of the time, not really key to their jobs, it may make sense to let them bring their own device and give them a $20 or $30 stipend.


But if a phone is mission critical with all the apps and data, I don’t know how you can turn that into a BYOD device. The legal system hasn’t decided who owns the data on an individual-liable device, even corporate data. It hasn’t ruled consistently on this yet.”


BYOD Myths: Cost Savings, Productivity Gains, Less Headaches

 

 

Tip #3 – Make Sure Operating Systems are Compatible


“One of the advantages to owning your own technology infrastructure is the assurance that all of the machines within the enterprise will talk to each other and behave in predictable ways. By allowing employees to bring their own devices, you introduce an element of randomness. Beyond the well-known Apple versus PC argument, there are also many operating systems out there in the land of smartphones: iOS, Android, Windows, Blackberry, Ubuntu Linux, and more. Will they be able to work with your own devices and the devices of their fellow employees?”


Small business owners, beware of BYOD


Tip #4 – Keep an Eye on Security


“Security and policy are important first steps in a BYOD environment. Thirty-nine percent of companies have experienced a security breach due to employees using unauthorized devices, according to a recent survey by British Telecom of 2,000 enterprises in 11 countries.”


BYOD policy: More than on-boarding and security


“CIOs have been dealing with mobile device security for a decade. First, there were BlackBerry devices. Then more smartphones emerged, followed by netbooks, and now Apple Inc. has made the tablet famous with the iPad and iPad 2. Now that their form and functionality have been adopted by the consumer outside of the IT shop, CIOs must address not only how devices fit inside their IT shops, but also how their users are connecting to (and putting at risk) the network with their own personal devices.”


Mobile device security and risks: What you need to know


Tip #5 – Have a Passcode Rule


“One of the biggest risks to small business owners that let employees use their own mobile devices is if that device will get lost or stolen with sensitive business data or customer information on it. In addition to enforcing a strong passcode rule, small businesses need to make sure the devices have encryption installed.”


How to Let Employees BYOD Without the Risk


Tip #6 – Have a Plan for Emails and Documents


“Email and documents remain two grays areas of which you need to be aware… pay special attention to what happens to your email since email messages stored on mobile devices can contain sensitive data that can be compromised if the device is lost or stolen.”


Tips For Making Sure “Bring Your Own Device” Doesn’t Blow Up In Your Face

 

 

Tip #7 – Plan Ahead on How to Recover Data


“You may be at risk when you walk around with corporate information on your device. If your device is lost or stolen, what liability do you assume? If you quit your job or get fired, what policies and procedures does your employer have in place to recover their data while removing any potential liability from yourself?”


Making Sure BYOD Doesn’t Mean “Bring Your Own Disaster”


Tip #8 – Establish Boundaries between Work and Home


“Some of those benefits [of BYOD] include improved productivity and work-life balance among employees as well as significant cost savings. At the same time, BYOD presents agencies with a myriad of security, policy, technical and legal challenges, the working group found.”


“… while improved work-life balance has been touted as a benefit of telework and BYOD, it can produce potentially negative results as well, particularly as employees may have a difficult time establishing work-life boundaries”


‘Bring Your Own Device’ for Beginners


Tip # 9 – Make Sure You Have a BYOD Policy in Place

“The details of any BYOD policy will be specific to a given organization, but most policies cover the same basic questions: How should users protect their devices? What data and applications can and can’t be accessed? And what happens when a user loses a device or leaves the company?”


How to create a BYOD policy


Tip # 10 – Explore the Idea of Creating Internal Apps

“While this [BYOD] has provided IT departments with a host of new security challenges, companies are now finding ways to work with the flow by creating and releasing proprietary, internal apps for smartphones and tablets; some even using their own app stores to do so. A recent survey of IT pros at 6,275 organizations found 66 percent were considering developing a corporate app store.”

Why businesses are creating their own internal app stores


Share Now:del.icio.usDiggFacebookLinkedInBlinkListDZoneGoogle BookmarksRedditStumbleUponTwitterRSS

Read the original blog entry...

More Stories By Hovhannes Avoyan

Hovhannes Avoyan is the CEO of PicsArt, Inc.,

@ThingsExpo Stories
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
“delaPlex Software provides software outsourcing services. We have a hybrid model where we have onshore developers and project managers that we can place anywhere in the U.S. or in Europe,” explained Manish Sachdeva, CEO at delaPlex Software, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...