Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

BYOD: Separating fact from fiction

Have you been able to separate fact from fiction when determining the specific business advantages that bring-your-own-device (BYOD) can provide?

brianChristiniNEW2

BYOD: Separating fact from fiction

byod, mobile device management, risk


Have you been able to separate fact from fiction when determining the specific business advantages that bring-your-own-device (BYOD) can provide? A recent white paper written for Trend Micro put some BYOD myths to rest and highlighted several significant trends among businesses. For example, despite recent headlines claiming BYOD can be a costly endeavor, more than half of organizations said costs either remained the same or decreased after implementing BYOD.

BYOD and mobile device security
While security is an important concern for many businesses leveraging BYOD, very few organizations ban BYOD even after a security breach. In fact, most organizations respond to security breaches by adapting their mobile device security practices. Forty-five percent of respondents said they reacted to breaches by enforcing data access restrictions, while 42.9 percent said they enforce security software installation. Respondents also indicated a few must-have conditions in acceptable use policies (AUP) and mobile device management (MDM) features.

"When asked about the components of the AUP documents, the ability of corporate IT to remotely wipe devices is the most common provision, followed by the right to monitor activity, the possibility that data may be exposed in case of litigation, and that incorrect login attempts can cause data deletion," the report stated.

BYOD requires mobile device management
A recent TechTarget blog post written by Alex Wood of IT service provider Point to Point highlighted the importance of using MDM to fully leverage the BYOD trend. According to Wood, MDM is necessary for mitigating risks such as data leaks, adding that it should be part of an evolving mobile strategy.

"One thing is increasingly clear - having some type of strategy for BYOD even if it’s relatively vague initially, is essential," Wood wrote. "Simply allowing staff to use their own devices to access business information will lead to all sorts of issues. Worryingly, a recent research has revealed that two thirds of organizations in the [United Kingdom] do not have any BYOD strategy in place. IT must set out guidelines and expectations as well as a degree of accountability."

While mitigating risks is important, MDM strategies can extend beyond pure mitigation and become a crucial element to enhancing employee productivity. By leveraging comprehensive mobile management technology such as MDM and mobile application management (MAM), business leaders can both reduce the chance of security breaches and enhance productivity by providing applications and other software tools to their mobile workforce.

Recommended Articles for You

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.