byod: overview and helpful tips for successful bring your own device strategy
DESCRIPTION
Free White Paper as a download on Cortado's website: http://bit.ly/1iHBVsq | More and more people want to include their personal smartphones, tablets or laptops in everyday business. But consumerization and Bring Your Own Device (BYOD) are a challenge for the administration and may pose a safety risk. If privately-owned devices are already in use in your company or you are considering the introduction of BYOD, many new questions have to be answered: Which departments and employees are suitable for participation, which devices are being used and how sensitive is the data, employees are dealing with. This paper gives a comprehensive overview and helpful tips so that you can easily implement a successful BYOD strategy. Complete white paper can also be downloaded for free on Cortado homepage: http://bit.ly/1iHBVsqTRANSCRIPT
Bring Your Own Device
A Concept with ROI Potential
Cortado
White Paper
2BYOD | April 2014 | www.cortado.com BYOD | April 2014 | www.cortado.com
Contents
BYOD - A Concept with ROI Potential ..................................................................................... 3
How can devices be securely integrated into the enterprise? .................................... 3
System Access Rights .................................................................................................................................3
Data and Transmission Encryption ...................................................................................................3
Essential: Secure Devices with Passwords ................................................................................3
Viruses and Malware ...................................................................................................................................4
The User as a Security Risk.....................................................................................................................4
Security Must be Managed .....................................................................................................................4
Remote Connections ....................................................................................................................4
Container Solutions ........................................................................................................................5
Controlled Openness ....................................................................................................................5
More than just MDM: Use of the organization’s existing infrastructure,
file sharing, and much more ........................................................................................................8
Who should take part in the BYOD program? ..........................................................................8
Itmustbeclarified: .......................................................................................................................................9
Control – What is allowed and what is useful? ..................................................................... 10
Roundup ..............................................................................................................................................10
3BYOD | April 2014 | www.cortado.com
BYOD - A Concept with ROI Potential
The IT world is being transformed by BYOD: BYOD - Bring Your Own Device. Initially
ridiculed by some, the idea has become an increasingly important concept. To put it
simply – employees also use their private devices for business purposes. More and
more organizations are discovering that it is essential they have a BYOD concept
in place.
Potential benefits include:
● Businesses can save 40 percent of their hardware costs according to Gartner
● Employees who use their private devices are more motivated
● E-mailsandotherdocumentscanbedealtwithoutsideofofficehours
● Users know their devices and therefore require less training and technical support
● Technology-savvy young employees, digital natives, are more inclined to work for a company with a BYOD program
● Security and productivity can be actually increased by avoiding workarounds
How can devices be securely integrated into the enterprise?
System Access Rights
Just as for employees working at a stationary desktop workplace, decisions need
to be taken about who will be able to access what data. Active Directory is of par-
ticular use in this area.
In many cases, it is also useful to further limit the rights of mobile users, to prevent
accidentaldeletionoffilesordatalossifadevicehappenstobelostorstolen.
Data and Transmission Encryption
Encrypted data transmission is the next mandatory security measure necessary to
prevent unauthorized reading of data. Usually, SSL-encryption of data being trans-
ferredbetween thedevice and the network is sufficient. If additional security is
deemed necessary, data can be embedded in a VPN tunnel or other proprietary
tunnels such as Mobile Data Service (MDS).
Essential: Secure Devices with Passwords
Mobile devices are often easily lost or stolen. An absolute must when it comes to
secure integration of smartphones and tablets is to secure the device itself with
the use of passwords. The length of passwords and the characters used, but also
remote wiping the device after x number of failed attempts are just some of the
options available to further increase password security.
Securitycomesfirst
when dealing with
smartphone and tablet
integration into
corporate IT.
Follow Cortado:: facebook twitter youtube linkedin
Download this white paper for free
from the Cortado Corporate Server website today!
www.cortado.com
http://bit.ly/1iHBVsq