b.y.o.d. - moira l. morrison

10
ABOUT B.Y.O.D. - BRING YOUR OWN DEVICE Byod is the label identifying the formalisation of employees using their personal or consumer technology, such as mobile devices & home pcs, on their corporate networks. Employees have always been guilty of bringing their own choice of devices to work, despite being provided with a company issue. Previously nothing more than toys, these devices have gradually become so powerful they now instantaneously produce a large percentage of the company products from marketing to analytics. Apple’s App Store has now seen more than 1 million approved apps since launch Authenticating 'byod' encourages this practice while providing processes which allow audit, tracking and management of the third party products now accepted as company critical.

Upload: incisiveevents

Post on 11-Nov-2014

799 views

Category:

Documents


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: B.Y.O.D. - Moira l. Morrison

ABOUT B.Y.O.D. - BRING YOUR OWN DEVICE

Byod is the label identifying the formalisation of employees using their personal or consumer

technology, such as mobile devices & home pcs, on their corporate networks.



Employees have always been guilty of bringing their own choice of devices to work, despite

being provided with a company issue.

Previously nothing more than toys, these devices have gradually become so powerful they

now instantaneously produce a large percentage of the company products from marketing to

analytics.

Apple’s App Store has now seen more than 1 million approved apps since launch

Authenticating 'byod' encourages this practice while providing processes which allow audit,

tracking and management of the third party products now accepted as company critical.

Page 2: B.Y.O.D. - Moira l. Morrison

Multiple solutions are being provided by the 'byod' trend including the ease of use for the

employee with no learning curves or training budgets necessary.

Plain sailing......

The removal of the need for duplicate devices i.e.

personnel phone work phone

Identify and Police device byod access

The openness of cloud computing and the enterprise mobile technologies generate new

security issues and introduce new IT security threats that need stronger regulations on what

can connect to corporate networks.

Page 3: B.Y.O.D. - Moira l. Morrison

In reaction to this, unified communication solutions have introduced standards across

platforms that will allow users on various devices to safely collaborate through centralized

infrastructure.

Bring Your Own Device The 10 Commandments of BYOD! Your Free Guide to a Strong BYOD Policy.

www.maas360.com/MDM-Guide

Bring Your Own Device Manage Employee Liable Devices. Secure & Flexible - Try for 30 Days

www.air-watch.com/BYOD-Download

Bring Your Own Device

The standards have a huge impact on traditional processes both legally and physically. We all

strive to find out how best to maintain security & compliance of the new, flexible, corporate

Page 4: B.Y.O.D. - Moira l. Morrison

network topology and the personal aspects of the employees device allowing us multiple

flexible desktop environments.

Bring Your Own Detonator?

Since there have been numerous security incidents surrounding unsanctioned devices joining

the corporate networks employers have implemented ways to avoid malware being

introduced by the downloading of apps via ‘app stores' such as Google Play. This mechanism

Page 5: B.Y.O.D. - Moira l. Morrison

has been undermined by the fact that this particular store now has more than 500,000 android

applications available, 100,000 of which were added in four months, making security very

hard to police.

Federation login and active directory capabilities have been introduced in an attempt to stop

intruder entry via the new channels.

A new world of risks and issues are introduced by consumers mobile devices interacting

openly with TV, print, media content and social networks which can be used to deploy

malware.

Page 6: B.Y.O.D. - Moira l. Morrison

Detonate your own device?

Your device now becomes a much higher responsibility since it now has the capacity to

access your employers' network. It may make you the target of crime.

Page 7: B.Y.O.D. - Moira l. Morrison

Your device may become infected by malware installed on your employees machines by their

enemies.

Approved handsets also now have personnel activity integrated with work at all times and

online and so it's hard to keep things private.

Bring Your Own 'Thing connected to the internet.'

It is not uncommon now to refer to devices as 'things connected to the internet'. This

identifies the trend for items not normally catagorised as computers to be used in business

comunication.

Point in hand is the ability to use cloud solution software such as search engines, email, social

networks like facebook and twitter etc on gym running machine and a pletharo of the other

exercise machines.

Page 8: B.Y.O.D. - Moira l. Morrison

'What it is connecting' is no longer deamed easily answerable and there's a surge to becoming

device independant to accomodate this. This would encourage activities like using your smart

watch to let your manager know you've just filmed a corporate online seminar via your

google goggles.

Wes Majerus, who is blind, "a great first step" after taking it for a spin.

Enterprize changes for BYOD

Identity management for employee will attempt to secure access from any device and provide

control over the influx of personnel devices.

Enforced network registration and monitoring provides the authentication of who, and what is

logging in.

Page 9: B.Y.O.D. - Moira l. Morrison



The tracking of IP addresses provides the information about where and when end-users

connect.

Conclusion - in summary

Coining the phrase ‘bring your own device' is the corporate genuflect to the processing power

provided by items that were chosen as preferred by the employee as opposed to the employer.

The

symbiotic trend is not only acknowledged it is now supported and expected to go from

strength to strength as mobile devices gain hold of the marketplace.

Issues with these devices has been ported from the entertainment zone to commerce and must

be addressed with attention relevant to their new activities.

Page 10: B.Y.O.D. - Moira l. Morrison



The predominant effects of employees having their own choice of devices in the work place

is the reduction of the i.t. infrastructure budgets and the increase in productivity and

efficiency through familiarity and preferential selection. ‘WIN WIN'.



Key learning points:

1 - About the 'bring your own device' trend.

2 - Security issues surrounding BYOD

3 - Benefits of BYOD

Moira L. Morrison, IT Specialist, moi!, UK