byod: overview and helpful tips for successful bring your own device strategy

4

Click here to load reader

Upload: jana-unterberg

Post on 07-Jul-2015

161 views

Category:

Technology


2 download

DESCRIPTION

Free White Paper as a download on Cortado's website: http://bit.ly/1iHBVsq | More and more people want to include their personal smartphones, tablets or laptops in everyday business. But consumerization and Bring Your Own Device (BYOD) are a challenge for the administration and may pose a safety risk. If privately-owned devices are already in use in your company or you are considering the introduction of BYOD, many new questions have to be answered: Which departments and employees are suitable for participation, which devices are being used and how sensitive is the data, employees are dealing with. This paper gives a comprehensive overview and helpful tips so that you can easily implement a successful BYOD strategy. Complete white paper can also be downloaded for free on Cortado homepage: http://bit.ly/1iHBVsq

TRANSCRIPT

Page 1: BYOD: Overview and Helpful Tips for Successful Bring your Own Device Strategy

Bring Your Own Device

A Concept with ROI Potential

Cortado

White Paper

Page 2: BYOD: Overview and Helpful Tips for Successful Bring your Own Device Strategy

2BYOD | April 2014 | www.cortado.com BYOD | April 2014 | www.cortado.com

Contents

BYOD - A Concept with ROI Potential ..................................................................................... 3

How can devices be securely integrated into the enterprise? .................................... 3

System Access Rights .................................................................................................................................3

Data and Transmission Encryption ...................................................................................................3

Essential: Secure Devices with Passwords ................................................................................3

Viruses and Malware ...................................................................................................................................4

The User as a Security Risk.....................................................................................................................4

Security Must be Managed .....................................................................................................................4

Remote Connections ....................................................................................................................4

Container Solutions ........................................................................................................................5

Controlled Openness ....................................................................................................................5

More than just MDM: Use of the organization’s existing infrastructure,

file sharing, and much more ........................................................................................................8

Who should take part in the BYOD program? ..........................................................................8

Itmustbeclarified: .......................................................................................................................................9

Control – What is allowed and what is useful? ..................................................................... 10

Roundup ..............................................................................................................................................10

Page 3: BYOD: Overview and Helpful Tips for Successful Bring your Own Device Strategy

3BYOD | April 2014 | www.cortado.com

BYOD - A Concept with ROI Potential

The IT world is being transformed by BYOD: BYOD - Bring Your Own Device. Initially

ridiculed by some, the idea has become an increasingly important concept. To put it

simply – employees also use their private devices for business purposes. More and

more organizations are discovering that it is essential they have a BYOD concept

in place.

Potential benefits include:

● Businesses can save 40 percent of their hardware costs according to Gartner

● Employees who use their private devices are more motivated

● E-mailsandotherdocumentscanbedealtwithoutsideofofficehours

● Users know their devices and therefore require less training and technical support

● Technology-savvy young employees, digital natives, are more inclined to work for a company with a BYOD program

● Security and productivity can be actually increased by avoiding workarounds

How can devices be securely integrated into the enterprise?

System Access Rights

Just as for employees working at a stationary desktop workplace, decisions need

to be taken about who will be able to access what data. Active Directory is of par-

ticular use in this area.

In many cases, it is also useful to further limit the rights of mobile users, to prevent

accidentaldeletionoffilesordatalossifadevicehappenstobelostorstolen.

Data and Transmission Encryption

Encrypted data transmission is the next mandatory security measure necessary to

prevent unauthorized reading of data. Usually, SSL-encryption of data being trans-

ferredbetween thedevice and the network is sufficient. If additional security is

deemed necessary, data can be embedded in a VPN tunnel or other proprietary

tunnels such as Mobile Data Service (MDS).

Essential: Secure Devices with Passwords

Mobile devices are often easily lost or stolen. An absolute must when it comes to

secure integration of smartphones and tablets is to secure the device itself with

the use of passwords. The length of passwords and the characters used, but also

remote wiping the device after x number of failed attempts are just some of the

options available to further increase password security.

Securitycomesfirst

when dealing with

smartphone and tablet

integration into

corporate IT.

Page 4: BYOD: Overview and Helpful Tips for Successful Bring your Own Device Strategy

Follow Cortado:: facebook twitter youtube linkedin

Download this white paper for free

from the Cortado Corporate Server website today!

www.cortado.com

http://bit.ly/1iHBVsq