Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

The Recipe for a Great BYOD Policy

A recipe that business and IT leaders can use to create a safe and successful bring your own device (BYOD) policy.

The Recipe for a Great BYOD Policy

by MaaS360 staff | July 25, 2012

You've got mobile device management (MDM) in place and are ready for workers to bring their own devices to the office. A pinch of application control. A dollop of remote wiping capability. Pop in a few user controls and voila!  Right? Well, it might not be quite that simple. There is however a recipe that business and IT leaders can follow to launch a safe and successful BYOD policy.

A recent ZDNet article highlighted some comments from John Girard, Vice President of Gartner's Information Security and Privacy Research Center. Girard spoke at the Gartner Security and Risk Management Summit and discussed the key ingredients for cooking up a strong BYOD policy.

Mobile device security - the main ingredient

Girard outlined several requirements for an effective BYOD policy: 

  • Start with policies for desktops to establish a baseline
  • Define functions that will be allowed on mobile devices
  • Determine how the business will distribute applications and data
  • Specify user controls and policy exceptions
  • Outline requirements that affect all BYOD policies

Although businesses should start with policies for desktops, Girard warned against relying entirely on those policies for securing mobile devices.

"You can't finish this job today by doing a word replacement for PC to mobile," said Girard, who was quoted in the article. "You have to change the policies, but that's the start. [In your PC policy,] do you encrypt emails today? Do you encrypt your workstations today? Are you actually taking efforts to manage privacy for data and email? These are the important questions."

Once a baseline has been established, the organization can move forward with specific policies, according to Girard. The key to every policy is user understanding. For example, policies that affect user data or access should be clear and readily available, so all users understand what actions the company will take if a device with sensitive data is lost or stolen. Organizations can develop an outline for remote wiping, encryption and jailbreaking, which affect all users in the organization, to build a clearer understanding of the organization's stance. One of the final things Girard discusses is that the policy should also include an opt-in for a robust MDM tool.

Foregoing mobile device management is risky business

A recent IT Business Edge article echoed Girard's final point: MDM is an important part of the business landscape. Or as Martha Stewart would say, "it's a good thing".

"MDM therefore goes from being a nice-to-have technology to perhaps one of the main ways that IT departments can begin to get a handle on their organizations’ potentially chaotic mobile landscapes," the article stated.

The role of MDM in business is evolving. Once business leaders understand their mobility needs, they can get the most out of MDM technology by matching those needs with features. Even though MDM technology is evolving, it is already at a stage where it can meet strict compliance and regulatory needs.

The U.S. Department of Interior recently selected MaaS360 for mobile device managementthe only cloud-based MDM solution that meets the demands of the Federal Information Security Management Actproviding robust support for a wide range of devices, including iPhones, iPads, BlackBerrys and Androids.

, , , , , , , , ,

wpmaas360mdmbestPractices2

Mobile Device Management Policy Best Practices

Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves.

Read more...

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    Mobility, big data and apps: A recap of our panel at Phorum Philly bit.ly/1h0jU2U
  • MaaS360 MaaS360 by IBM
    Google Glass On Sale: Is Your Office Ready? bit.ly/Qb0Eu5
  • MaaS360 MaaS360 by IBM
    How WaWa, Lockheed Martin, and Penn Medicine are tethering BIG data and mobile bit.ly/1h0jU2U

Most Active Users

vhetrick
Ryan_Roth
jharrington
Joe Pappano
bcampbell
Donna Lima
jwittkopp
KaylaBittne...
manthony
Kumar A
Sobek
Fov
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.