Tuesday,26 November, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

8 Considerations for a Successful BYOD deployment

Published Nov 1, 2015

The concept of BYOD is less than a decade old but it's already outlived its adolescent buzz and is now a trend that has matured into a market worth billions. A recent study carried out by MarketsandMakets revealed that the BYOD market is increasing at an annual compound rate of more than 25% a year. This puts the enterprise mobility market at $266.17 billion in 2019.

The advantages and challenges of BYOD go hand-in-hand

Deployed successfully, the advantages of BYOD include increased productivity, lower costs and overall employee satisfaction. This is particularly true for organisations with remote workforces – giving employees the flexibility to log in and access information easily with mobile devices means less frustration for the employees and ultimately more productivity. The same is true of onsite employees when they bring their own mobile devices and also for guests or partners who attend meetings.

But the enterprise also needs to ensure that the devices, apps and information being used are secure. That's the balance that needs to be struck for a successful BYOD strategy. Putting in place a policy that's too restrictive in terms of devices and apps supported or technology that's difficult to use, is unlikely to get buy-in from employees. Gartner estimates that by 2016, 20 percent of enterprise BYOD programs will fail due to enterprise deployment of mobile device management measures being too restrictive[ii].

So how can businesses reap the advantages and avoid the pitfalls of BYOD?

Considerations for a successful BYOD strategy

1. Devices

The first thing to think about is what devices to support because supporting mobile devices is very different to supporting desktops. Unlike desktops, software for mobile devices are updated every few months. Moreover, employees will have favourite brands which they'll want to use, but you have to be realistic about what the IT department's resources can realistically support and make a balanced decision about which devices you'll support.

2. Apps

There's no doubt that organisations are benefiting from giving employees access to mobile applications such as email, browser, collaboration tools, document management and remote desktop access, but some applications come with a risk. In the 2015 Data Breach Investigations Report by Verizon, researchers from FireEye analyzed more than 7 million mobile apps to find that 96% of mobile malware was targeted at the Android platform. They also found that more than 5 billion downloaded Android apps are vulnerable to remote attacks[iii].

With a marketplace saturated with not only mobile devices but also with a slew of apps, it is imperative that your strategy addresses the risks that each of these individual factors presents to your IT infrastructure.

3. Access

Implementing a robust SSL VPN and Network Access Control (NAC) solution is a must for organisations adopting BYOD to protect the enterprise network. Role-based, application level security policy enforcement will allow enterprises to manage and monitor mobile device sessions via on-premises networks as well as over secure VPN.

Your BYOD policy also needs to extend to guests, visitors and business partners that your employees need to collaborate with. A NAC solution that offers granular control over guest network access will allow your employees to share data without compromising your network.

4. Usability

One of the main reasons why many BYOD and remote access programs fail is because they're simply too complex. The first priority in terms of usability should be the successful and efficient on-boarding of users - if connectivity is too complex, productivity will suffer. A NAC solution that offers automated configuration and a unified desktop client that can help to streamline the overall user experience will help with both on-boarding and connectivity.

5. Security

Across countless surveys the number one perceived inhibitor to widespread BYOD adoption is security, followed closely by compliance issues. This is not an ungrounded fear, as the use of enterprise apps on employee-owned mobile devices may lead to new data leakage and connectivity issues. To that end, any device accessing your corporate network should be viewed as a potential risk. Security also covers the issue of loss of devices which, more often than not, means a loss of data.

Although all the major device manufacturers now include optional encryption across smartphone and tablet devices, there is still uncertainty over managing BYOD and while EMM (see below) plays a part in supporting security, so too does the right company culture.

6. The actual policy and EMM

A BYOD policy is comprised of several aspects. The first is compliance with any industry requirements such as regulatory issues within healthcare, financial services and public sector. The policy also needs to give employees access to the underlying application and business processes they need. Lastly, any policy needs to be backed up by enforcement and management tools - this is where Enterprise Mobility Management (EMM) comes in. EMM can help define what can be enforced within a BYOD policy and help create processes for dealing with issues such as when devices are lost, stolen or misused or indeed when an employee leaves.

7. Culture

Considering over half of security breaches are the result of human error[iv], a successful BYOD transition requires enterprises to evangelise the benefits and promote its use to deliver the promised advantages of increased productivity and employee satisfaction. But this is also about educating users about the impact of data losses and developing a culture of responsibility for mobile devices and the data they house.

8. The future

The last consideration is flexibility. With the BYOD concept less than a decade old, it is critical that enterprises heading down this path consider technologies that are relatively open and able to support the widest ecosystem of applications possible both now and in years to come.

BYOD is complex but enterprises who avoid taking ownership of it not only won't benefit from the advantages but could also be introducing further risk by turning a blind eye to unofficial BYOD practices that can open up the network to serious security threats. A BYOD policy is becoming a must for most enterprises.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks