b.y.o.d. - moira l. morrison
DESCRIPTION
TRANSCRIPT
ABOUT B.Y.O.D. - BRING YOUR OWN DEVICE
Byod is the label identifying the formalisation of employees using their personal or consumer
technology, such as mobile devices & home pcs, on their corporate networks.

Employees have always been guilty of bringing their own choice of devices to work, despite
being provided with a company issue.
Previously nothing more than toys, these devices have gradually become so powerful they
now instantaneously produce a large percentage of the company products from marketing to
analytics.
Apple’s App Store has now seen more than 1 million approved apps since launch
Authenticating 'byod' encourages this practice while providing processes which allow audit,
tracking and management of the third party products now accepted as company critical.
Multiple solutions are being provided by the 'byod' trend including the ease of use for the
employee with no learning curves or training budgets necessary.
Plain sailing......
The removal of the need for duplicate devices i.e.
personnel phone work phone
Identify and Police device byod access
The openness of cloud computing and the enterprise mobile technologies generate new
security issues and introduce new IT security threats that need stronger regulations on what
can connect to corporate networks.
In reaction to this, unified communication solutions have introduced standards across
platforms that will allow users on various devices to safely collaborate through centralized
infrastructure.
Bring Your Own Device The 10 Commandments of BYOD! Your Free Guide to a Strong BYOD Policy.
www.maas360.com/MDM-Guide
Bring Your Own Device Manage Employee Liable Devices. Secure & Flexible - Try for 30 Days
www.air-watch.com/BYOD-Download
Bring Your Own Device
The standards have a huge impact on traditional processes both legally and physically. We all
strive to find out how best to maintain security & compliance of the new, flexible, corporate
network topology and the personal aspects of the employees device allowing us multiple
flexible desktop environments.
Bring Your Own Detonator?
Since there have been numerous security incidents surrounding unsanctioned devices joining
the corporate networks employers have implemented ways to avoid malware being
introduced by the downloading of apps via ‘app stores' such as Google Play. This mechanism
has been undermined by the fact that this particular store now has more than 500,000 android
applications available, 100,000 of which were added in four months, making security very
hard to police.
Federation login and active directory capabilities have been introduced in an attempt to stop
intruder entry via the new channels.
A new world of risks and issues are introduced by consumers mobile devices interacting
openly with TV, print, media content and social networks which can be used to deploy
malware.
Detonate your own device?
Your device now becomes a much higher responsibility since it now has the capacity to
access your employers' network. It may make you the target of crime.
Your device may become infected by malware installed on your employees machines by their
enemies.
Approved handsets also now have personnel activity integrated with work at all times and
online and so it's hard to keep things private.
Bring Your Own 'Thing connected to the internet.'
It is not uncommon now to refer to devices as 'things connected to the internet'. This
identifies the trend for items not normally catagorised as computers to be used in business
comunication.
Point in hand is the ability to use cloud solution software such as search engines, email, social
networks like facebook and twitter etc on gym running machine and a pletharo of the other
exercise machines.
'What it is connecting' is no longer deamed easily answerable and there's a surge to becoming
device independant to accomodate this. This would encourage activities like using your smart
watch to let your manager know you've just filmed a corporate online seminar via your
google goggles.
Wes Majerus, who is blind, "a great first step" after taking it for a spin.
Enterprize changes for BYOD
Identity management for employee will attempt to secure access from any device and provide
control over the influx of personnel devices.
Enforced network registration and monitoring provides the authentication of who, and what is
logging in.

The tracking of IP addresses provides the information about where and when end-users
connect.
Conclusion - in summary
Coining the phrase ‘bring your own device' is the corporate genuflect to the processing power
provided by items that were chosen as preferred by the employee as opposed to the employer.
The
symbiotic trend is not only acknowledged it is now supported and expected to go from
strength to strength as mobile devices gain hold of the marketplace.
Issues with these devices has been ported from the entertainment zone to commerce and must
be addressed with attention relevant to their new activities.

The predominant effects of employees having their own choice of devices in the work place
is the reduction of the i.t. infrastructure budgets and the increase in productivity and
efficiency through familiarity and preferential selection. ‘WIN WIN'.

Key learning points:
1 - About the 'bring your own device' trend.
2 - Security issues surrounding BYOD
3 - Benefits of BYOD
Moira L. Morrison, IT Specialist, moi!, UK