Home » BYOD, Networking, Security, Technology

Twelve Steps to Bring Your Own Device (BYOD) Success

Author: Paul Simoneau 3 May 2012 4,128 views No Comments

Whether one calls it Consumerization or the Bring Your Own Device (BYOD) era, it has clearly begun in earnest. The availability of 4G phones, tablets, hot spots, and their usage are expanding at amazing rates. Now is a good time to look at the challenges and opportunities of BYOD. Here are 12 areas that deserve careful consideration.

Security

Most enterprises considering BYOD think of security first. Securing the mobile device is important for different reasons, such as:

  • Preventing access to the enterprise network by an unauthorized user of an authorized device
  • Preventing unauthorized access to sensitive enterprise data that may be stored on the mobile device
  • Preventing any malware from infecting the mobile device and then the enterprise network
  • Preventing unauthorized access to the user’s personal information

Inventory

Today’s users often carry multiple mobile devices, such as a laptop, a notebook, a netbook, a tablet, and/or a Smartphone. Each mobile device has been on the market long enough to have seen multiple changes or upgrades to the operating system and other specifications. When adding devices to the enterprise network inventory, consider including the following items:

  • User
  • Storage
  • User e-mail
  • Wi-Fi versions supported
  • Operating System
  • Software applications

Registration

After adding the mobile devices to an inventory and deciding which of them are eligible to access the enterprise network, there must be a registration procedure. The enterprise IT department may choose to develop this software in-house, though most will find it easier to use a Mobile Device Manager (MDM) package to support this process.

Estimates

There is a finite limit to the number of mobile devices and applications that any enterprise network can support. BYOD dramatically increases the strain on the enterprise network, and it is, therefore, paramount to analyze potential bandwidth needs and possible challenges.

Bandwidth

Controlling the amount of network bandwidth used by mobile devices works in much the same way as with wired devices; therefore, there are some choices to be made regarding how best to proceed for optimal bandwidth.

Tracking

Keeping track of mobile device uses and usage improves the accuracy of traffic estimates as well as bandwidth planning. Knowing where mobile users are going and what they are doing in the enterprise network makes proactive network troubleshooting, network planning, and infrastructure adjustment more accurate and effective.

Compliance

Many of the regulations relating to enterprise computing and networking came into effect before the rush of mobile devices occurred. The challenges are to follow those regulations without having control over all the BYOD communications. Separately, some states and countries (such as the UK’s Data Protection Act 3) require written notification to users that you are monitoring their online activities and why. Adding this notification to the AUP that the user signs before accessing the enterprise network is just one more way to help maintain compliance.

Storage

In the best of all worlds, the expanded storage on a mobile device would be clear of any enterprise data, or sensitive or public knowledge. It is in the users’ best interest to be sure this is true. Many enterprise IT departments require a “force wipe” program to remove any enterprise data from the users’ mobile devices upon an employee leaving the enterprise or when the device is lost or stolen. This program may also wipe all personal data.

Financial

When an enterprise decides to allow BYOD access, some financial questions are bound to arise. Is this mobile device access a business cost or a convenience to the user? Will this apply to all employees or only a select group? Does the enterprise compensate the user for purchase, for monthly carrier charges, for insurance, for replacement…? How does the enterprise decide?

Multiples

More and more users will own two or three mobile devices that will be used in the enterprise. Unlike single location desktop computers, these mobile devices may access the enterprise network simultaneously. Accurate and complete tracking and logging of each device supports security, network monitoring, and network traffic flow.

Ownership

While most organizations have left mobile device ownership to the users, some have taken other routes. A few have purchased the devices for a minimal fee so that they may have legal control of the device and then resell it to the user at a future date for the same minimal amount.

Revocation

There will come a time that the mobile device (or the user) will need to have access revoked. In the case of the user, it could come from an AUP violation or departure from the enterprise or changing jobs in the organization. With the monitoring, tracking, and logging of each device, it is much easier to know if data may be stored on the device and to what extent so a limited wipe of enterprise data and configurations may be all that is required before user departure.

IT departments have multiple opportunities and challenges as a result of the BYOD invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provides a more detailed view of network traffic flow. Beyond that, IT will gain valuable insight into which devices work best with the layout of the enterprise network.

Excerpted from Global Knowledge White Paper: 12 Steps to Bring Your Own Device (BYOD) Success

Related Post
Are You Ready for Mobile Learning?

Related Courses
Understanding Networking Fundamentals
TCP/IP Networking
Troubleshooting TCP/IP Networks with Wireshark

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...Loading...

Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.