Quantcast
Channel: Enterprise In Motion » Cheryl Lacor
Viewing all articles
Browse latest Browse all 10

BYOD

$
0
0

BYOD

1.  Redefining BYOD

Employer’s realize that allowing employee’s to use their own device at work, (BYOD) , can increase productivity.  Employees enjoy the familiarity of their own smartphone and the decrease in cost as the company picks up the tab for their personal use as well.  BYOD is not without its risks for the enterprise though; the challenges of managing and securing a heterogeneous estate of mobile devices should not be underestimated.  Many of the BYOD headaches for enterprises can be reduced to a few discrete problems. The multiplicity of devices and operating systems, the inappropriateness of a particular platform to a given role or the legality of making modifications to someone else’s “computer” for instance, how do you legally “wipe” a device that you do not own?  An alternative approach  has been called “Inverse BYOD” where a business owned device is provided to the employee for both personal and business use. This strategy has some mileage and offers the beginnings of a workable long-term strategy for enterprise.  A Bring Your Own Data strategy means that companies can offer devices from a pool of “enterprise approved” hardware. Approved for their manageability and for their appropriateness for the employee’s role. Companies are no longer in the position of having to say yes to everything for everyone, neither are they obliged to support every flavour of every Operating System from every manufacturer.

http://www.cio.co.uk/opinion/ferguson/2012/11/05/redefining-byod

2.  Enterasys Provides Secure BYOD Solution for Sinclair Community College

Sinclair Community College, located in Dayton, Ohio, has deployed identiFi™, the new Enterasys WLAN solution, to support its BYOD and wireless networking initiatives.  Responsible for supporting the Wi-Fi needs of 24,000 students and 4,000 faculty and staff, Sinclair Community College selected the Mobile IAM solutionfrom Enterasys as its comprehensive BYOD capabilities provide total security, full IT control and a predictable network experience for all users.An early adopter of BYOD, Sinclair Community College developed an in-house secure LAN solution using open and standard products. Although this solution helped launch its BYOD program, it lacked the necessary granular controls and automation necessary to keep pace with the college’s escalating networking demands. With 20 buildings in downtown Dayton and five remote locations, Sinclair Community College needed a tool that could quickly adjust and distribute policies to all of its locations. The Enterasys Mobile IAM policy automation and provisioning capabilities enable a single policy approach for the college’s wired, wireless and VPN deployments that simplifies management and eliminates potential security holes.

3. BYOD : McAfee recommends some best practices
Securing data without affecting users’ productivity requires a strategy that should meet compliance requirements of an organization.  Michael McAfee addresses how a business can fall victim to cyber crimes.Our strategy is different from other vendors. We focus on securing the device so one can start to think on the content and enterprise application security. That is very important.You can download million of apps but how do you know those apps are not scanning your data. We focus on security depending on what applications you use. We provide the user the ability to secure data. The most popular concepts in India is the Security Timer technology.Our technology allows the user to have an alarm against theft. There are a number of benefits. If you lose your device, the information stored in our Security Container is encrypted and is secured. If someone finds your device, they can’t access the data.http://archive.ciol.com/News/News-Reports/BYOD-McAfee-recommends-some-best-practices/166554/0/4. IT support for BYOD decreases:New research from IT services provider, Unisys, has found that IT support for BYOD has decreased significantly as compared to 2011.  The proportion rated as having high levels of support for employee-owned smartphones and tablets fell from 24 per cent to 15 per cent.  However, it also revealed IT support for company-owned smartphones and tablets in Australian organisations has nearly doubled since last year.In 2012, 57 per cent of Australian employers responding to the survey rate their organisation as providing a high level of support for company-owned mobile devices, up from 32 per cent in 2011.
5. Confusion Abounds about BYOD
What is the real information about BYOD?  Is BYOD a security nightmare or a productivity boon?  Does it save money or drain the service desk?  Respondents to a survey by Xigo say that cost-savings is a top goal for BYOD programs, although most thought it would increase IT and security costs.

The post BYOD appeared first on Enterprise In Motion.


Viewing all articles
Browse latest Browse all 10

Latest Images

Trending Articles





Latest Images