Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Enterprise policy can address BYOD challenges

Many challenges created by the bring-your-own-device (BYOD) trend can be addressed through the integration of technology and enterprise policy, according to a recent TechNewsWorld article.

brianChristiniNEW2

Enterprise policy can address BYOD challenges

accepted use, byod, policies


Many challenges created by the bring-your-own-device (BYOD) trend can be addressed through the integration of technology and enterprise policy, according to a recent TechNewsWorld article. Technology plays a vital role in mitigating risks such as data security and loss. While it is the role of IT to implement mobile device management (MDM) technology that can protect company data in a highly diverse environment, enterprise policies are necessary to address legal issues.

The article uses email as an example. When employees use company-owned devices to send an email, it is understood that the company has the right to look at that email, but that clarity begins to break down when emails are sent from personal devices. More often than not, there are no clear legal answers for these kinds of issues, so enterprise policies must address accepted use issues while employees are at work.

"Given all these BYOD issues, it seems pretty clear that there should be a written document specifically delineating the rights and obligations relating to the employee's use of employee-owned smartphones, tablets and computers," the article states. "In addition to addressing IP and email, the document should address employer requirements for security software, encryption and passwords on these devices if the employees have access to the employer's email, system and the like."

Recommendations for mobile device management policies

As businesses start to plan for BYOD, it's important that they consider the right things so important aspects of policy can be addressed. A recent ZDNet article highlights several considerations enterprises need to think about for BYOD.

One important consideration is security, including how they will enforce strong passwords, antivirus software and take other precautions to protect sensitive data from malware. Businesses can make their employees sign contracts, but they can also implement mobile security technology to prevent devices that don't meet security requirements from accessing the network.

Plan for ongoing mobile device management

Organizations must also consider the best approach for application delivery and the type of infrastructure they will require. In addtition, they will need to determine whether any changes must be made to the existing network environment.

"Traditional, platform-dependent software applications will create technology and data compatibility issues for the business," the article states. "IT organizations must begin to ease the transition now by moving to cloud-based, platform-agnostic, extremely accessible applications now."

Once a plan for implementing BYOD policies is in place, the next step is determining how BYOD will be supported on an ongoing basis. If the IT department will provide tech support for personal devices, IT personnel need to determine how support will be provided. ZDNet suggests setting up social IT solutions to enable information sharing between users.

Recommended Articles for You

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.