Top 50 BYOD Resources – BYOD Security, Policy, Trends & More
There are several advantages to implementing a bring your own device (BYOD) program in your organization, including lower overhead and giving employees the opportunity to work on devices with which they are most comfortable. There are challenges with BYOD, though, that should be considered when making the BYOD plunge. To help your organization wade through all of the BYOD noise and make the best decision for your workforce, we have compiled a list of top BYOD resources.
We have selected articles, eBooks, guides, infographics, webinars, and white papers to help you along your BYOD journey. The resources on our list feature executives, IT professionals, top tech companies, and other thought leaders who have experience with implementing and guiding a BYOD program, as well as those who have collected data on and analyzed existing BYOD programs to offer their advice and expertise on BYOD.
While we have listed our top 50 BYOD resources below in no particular order, we have included a table of contents to make it easier for you to jump to the resource categories that most interest you.
ZDNet delivers round-the-clock news coverage and analysis on the trends and technologies that matter most to IT professionals and decision makers. In this BYOD article, Adrian Kingsley-Hughes, ZDnet contributor and internationally-published technology author, explains how BYOD works, especially when employers have a clearly-defined BYOD policy in place.
Three key points we like from How to Make BYOD Work:
- It is estimated that 50 percent of firms will demand that employees make use of BYOD by 2017
- There are potential BYOD pitfalls that require both employee and corporate considerations
- Effective BYOD policies cover acceptable use, authorized devices, support, security, reimbursement, and liability, risks, and a disclaimer
A technical writer and analyst focused on enterprise mobility, BYOD, and IT consumerization, Will Kelly explains how BYOD experienced some criticism in 2014 but looks as though it could thrive in 2015. He explores the innovation that is driving BYOD and how it could surpass other industry analysts’ predictions.
Three key points we like from 5 Reasons Why BYOD Survived 2014 and Will Prosper in 2015:
- More cloud and enterprise mobility helps to justify employee and contractor BYOD use, especially because their devices don’t touch network endpoints
- Employers will see fewer reasons to pay for mobile devices and related expenses as the hiring of contractors and other temporary workers rises in 2015
- The 2014 California BYOD lawsuit prompted companies to make strategic acquisitions enabling businesses to support split billing or dual billing of calling minutes and data on BYOD devices between the employer and employee
Elizabeth Weise covers computer security, technology, and Silicon Valley for USA Today. In this USA Today piece, Weise explores the conundrum of employees using “the technology they already own and love for work, while also keeping vital corporate data and systems secure.” She also shares information from surveys and reports about how companies and employees handle BYOD.
Three key statistics we like from Bring Your Own Dilemmas: Dealing with BYOD and Security:
- A survey found that 61% of companies had employees using personal smartphones or tablets for work-related activities
- 50% of companies plan to move exclusively to BYOD for smartphones in 2017
- 42% of companies required employees to have a security app installed, and only 19% required mandated security supplied by the company
In this BYOD article for PCWorld, Tony Bradley, editor in chief of TechSpective.net, explores the results from a BitDefender survey that suggests BYOD policies and controls are not secure enough. 1,045 Internet users were surveyed, and the results “should be a wake-up call for companies to examine their BYOD policies, and ensure that adequate security controls are in place to safeguard corporate data and resources.”
Three key points we like from Survey: BYOD Security Remains Spotty, With Users Unaware or Unmotivated About Risks:
- BYOD is an accepted norm, as more than half of employees who are permitted to use their own smartphones, tablets, or laptops do so
- Half of US employees store work-related data on their personal mobile devices even when there is no BYOD policy
- One of the most important security tools for mobile devices that store company data is the ability to remotely wipe sensitive information in the event the device is lost or stolen, yet 2/3 of US employees don’t know the remote wipe capability exists or have not yet activated it
Dark Reading offers news and information on IT security and helps information security professionals manage the balance between data protection and user access. In this Dark Reading BYOD article, Michele Chubirka asserts that BYOD is more about security, organizational politics, and human psychology than it is about technology.
Three key points we like from The Good & Bad of BYOD:
- IT departments spend a great deal of time dealing with users who demand more freedom of choice in how they use technology for their jobs
- Users get frustrated when they have specific needs driven by their job or personally own better technology, but they can’t get anyone in IT to meet them halfway
- Embracing BYOD can increase risks, but denying consumerization trends is even more dangerous for organizations, so security teams should stop trying to fight reality and understand that their role is in facilitating the business and BYOD rather than obstructing it
InfoWorld has long been a source for expert, in-depth analysis of enterprise tech for technology decision makers and business leaders. In this BYOD article, InfoWorld executive editor Galen Gruman explains how major steps are being taken in separating work and personal communications to make BYOD a more sensible practice.
Three key points we like from A Big Step for BYOD: Separate Billing for Smartphones Is Finally Here:
- One top corporate objection to BYOD has been the overhead associated with managing employee expense reimbursements and the added cost of paying full smartphone plans to avoid the accounting overhead
- True BYOD means employees choose a compatible device and use the best network for them, but previous services have allowed separate work billing for smartphone voice and data use only when employees had the same carrier as their company
- AT&T Work Platform makes it easier for companies to easily separate voice and text usage for work from that used for personal purposes, creating a real separation for compliance purposes between work and personal communications and becoming a more valuable option than splitting the bill
NetworkWorld is a premier provider of news, intelligence, and insight for network and IT executives. In this NetworkWorld BYOD article, freelance tech journalist Andy Patrizio shares how Gartner finally is measuring real dollar savings for companies using BYOD programs.
Three key points we like from BYOD Is Saving Serious Money for IT:
- Gartner found that IT departments can support nearly three times as many users in BYOD tablet programs than company-purchased tablet programs
- According to Federica Troni, research director at Gartner, “Without a stipend, direct costs of user-owned tablets are 64% lower. When organizations have several users who want a tablet as a device of convenience, offering a BYOD option is the best alternative to limit cost and broaden access.”
- The savings almost all come from acquisition costs, so companies should design BYOD programs around a primary goal, such as user satisfaction, cost reduction, or mobile expansion
BetaNews delivers up-to-date insight and analysis of the information technology industry and its role in economy and society. In this BetaNews BYOD article, Daniel Alarcon outlines the major reasons that BYOD is not yet a completely standard accepted business practice.
Three key points we like from The Main Obstacles To BYOD Mass Adoption:
- Data security is the number one problem of implementing BYOD in the workplace
- Privacy concerns are valid for both employees who want to keep their personal photos, texts, and phone calls away from employers and companies who want to keep their data away from unauthorized users and hackers
- The costs of compliance to ensure BYOD policies work for the company are expensive
Abby Perkins writes about jobs, workplace culture, and business solutions at Talent Tribune. In this BYOD article for ITProPortal, she describes BYOD as being “officially mainstream,” since the number of employees using their own smartphones for work-related activities is expected to rise from approximately 33% to more than 60% by 2020. Yet, the major adoption of BYOD brings with it several changed business practices.
Three key points we like from BYOD: What To Expect in 2015:
- Cyber liability insurance soon will become more mainstream as companies need to protect themselves as BYOD grows
- Enterprise mobility management 9EMM) will mature throughout 2015 and blur the lines between information security and application security
- BYOD will become a standard incentive offered to young prospective and current employees, as being able to use personal devices especially is important to millennials
InformationWeek covers IT news and information for businesses that use technology, and this BYOD piece by Thomas Claburn, business and technology writer, describes how BYOD gives organizations advantages. While BYOD has inherent management challenges, its potential benefits are worthy of consideration.
Three key points we like from Make BYOD Work: 9 Key Considerations:
- The benefits of BYOD include promoting productivity and potentially saving hardware costs
- For BYOD programs to succeed, organizations need to involve all relevant departments, including finance, legal, human resources, and operations
- Organizations, at the very least, should have a pilot program to evaluate BYOD
VP of Business Development and Strategy for CloudEntr at Gemalto, Tom Smith shares five ways to support BYOD adoption while keeping company data secure in this article for Entrepreneur. Smith explains that BYOD is moving beyond laptops and the workplace walls into everyday life, as more than 60% of employees access business-related information through mobile devices and the expanding wearables market presents new challenges for company security while bringing new functionality into the workplace.
Three key points we like from 5 Ways to Encourage BYOD and Keep Your Company Data Secure:
- It is crucial for IT professionals to put a BYOD policy into place that educates employees on proper security protocols and dictates required enrollments
- IT should take proactive steps to perform an audit and periodically petition employees to register new devices with IT, grant IT access, monitor privileges, install MDM software, and report the transition of old devices so that access and data can be removed
- Create an addendum to your BYOD policy around wearables and educate employees on safe usage
In this TechRadar BYOD article, David Langhorn, head of corporate and large enterprise at Vodafone UK, explains that tech must keep up with staff demands, especially as the mobile workforce and BYOD mature. He also explores some of the business trends that will shape 2015 in relation to BYOD.
Three key points we like from Business Trends for 2015: The Mobile Workforce for BYOD Maturing:
- There is a projected uptake of tablets, and they will become even more prominent within large and small businesses
- ICT providers will need to find ways to offer simple to manage, integrated, and converged services that support multiple devices and operating systems across fixed, mobile, and IT
- 2015 will see a significant incrase in demand and investment among IT leaders for technology that supports a maturing BYOD environment and mobile workforce while ensuring optimal security
In this BYOD opinion piece for CSO, Wisegate editor in chief Elden Nelson reports on the results of a Wisegate survey that sought to discover how difficult it is for companies to tighten IT security regarding BYOD. The survey also asked senior IT professionals about the biggest BYOD security risks and how the top minds in IT plan to combat them.
Three key points we like from BYOD and Cloud Are Top Data Breaches and Malware Risks, Survey Shows:
- Over 51% of respondents included data breaches and malware, plus insider and outsider threat, BYOD management and security, and advanced persistent treats as their companies’ top risks
- Savvy security teams will earn users’ trust by showing how companies only can monitor corporate data but don’t and cannot monitor anything else when it comes to BYOD
- Security teams will need to shift from protecting devices to protecting data as BYOD programs take hold
TrendLabs offers security news and information directly from the experts, and their Security Intelligence Blog focuses on threat news and information. In this BYOD post, chief technology officer Raimund Genes explores the possibility of using something similar to a Virtual Desktop Infrastructure (VDI) as a solution for BYOD data issues.
Three key points we like from Mobile Virtualization – Solving the BYOD Problem:
- With a Virtual Mobile Infrastructure (VMI), the client on the phone will access a virtual mobile operating system running on company servers
- When properly implemented, a VMI solution would not leave data at risk on the user’s device
- VMI helps manage the risks associated with BYOD so that companies can reap all of the benefits of BYOD while reducing potential problems
Jaijumar Vijayan is an independent journalist and tech content creation specialist who covers data security and privacy, business intelligence, big data, and data analytics. In his Computer World BYOD article, Vijayan reports on the surveys that show many workers aren’t following the BYOD security policies their companies are implementing.
Three key points we like from There’s Still a Security Disconnect On BYOD:
- Fewer than one in five companies report having controls in place for enforcing policies governing the use of personally owned mobile devices
- On the whole, enterprise users say they will choose not to bring personal devices to the workplace if employers plan to install security software on them
- More than half of the surveyed employees fear that companies would gain access to their personal data via corporate security tools
Mike Foreman, AVG’s general manager of SMB and an advocate of BYOD for small businesses, authored this BYOD eBook for AVG. The eBook serves as a guide for steering organizations through BYOD programs.
Three key ideas we like from Bring Your Own Device, an eBook from AVG:
- The opportunity associated with BYOD for businesses
- BYOD benefits by the numbers
- BYOD Legal issues owners need to consider
ZDNet offers a wealth of BYOD content, and to make it accessible and convenient, they have compiled it, along with content from TechRepublic, into this eBook, available as a PDF. The eBook covers how BYOD has reshaped the way IT is purchased, managed, delivered, and secured.
Three key ideas we like from The Executive’s Guide to BYOD and the Consumerization of IT:
- BYOD adoption is on the rise
- IT leaders and companies should not ignore BYOD
- BYOD’s potential to increase worker productivity, create more flexible working environments, and reduce IT costs
Cost: FREE for registered ZDNet and TechRepublic members
The Global Digital Citizen Foundation strives to grow responsible, ethical citizens for the digital world. Their BYOD eBook, geared toward schools, offers a list of things to consider before starting a BYOD program.
Three key topics we like from 10 Things to Know Before Starting a BYOD Program:
- Crucial considerations to make before diving into a BYOD program
- Important questions regarding BYOD readiness
- There are both challenges and rewards associated with BYOD programs
Base offers its BYOD eBook, What BYOD Really Means For Your Sales Force, to sales organizaitons seeking to prepare for implementing a BYOD program. The eBook details how BYOD policies should specify expectations about keeping clients protected and guiding staff on using their own devices to benefit themselves and their organization.
Three key topics we like from What BYOD Really Means For Your Sales Force:
- BYOD and the security of company data
- How to know which devices to prepare for
- Choosing applications that work best for BYOD
20. Making BYOD Work
FierceMobileIT offers its BYOD eBook, Making BYOD Work, to show enterprises how to navigate the challenges associated with BYOD to make it work best. The BYOD challenges and issues covered in the eBook include those relating to management, support, security, and access control.
Three key topics we like from Making BYOD Work:
- Knowledge necessary for considering a mobile device management or containerization approach to BYOD
- Enterprise BYOD policies for enforcing security
- The security threats and legal ramifications posed by BYOD
21. BYOD For Dummies
This BYOD eBook from VMware delivers all of the facets you need to implement a successful BYOD program. Even if you have limited staff and IT budgets to support your BYOD program, it is possible to allow employees to bring their own devices to work.
Three key topics we like from BYOD For Dummies:
- How to give users freedom while remaining secure and compliant
- Various approaches to tackling BYOD
- Tips for creating and starting a best-practice strategy for BYOD
IT Security Watch provides answers about current security issues in email, internet, data, network, and mobile. Their BYOD eBook, The CIO Playguide for Secure BYOD, examines the ways in which mobile devices and collaboration present opportunities for organizations but challenges for IT.
Three key topics we like from The CIO Playguide for Secure BYOD:
- Complications for IT executives in deploying processes and tools to mitigate security risks and assure compliance with BYOD programs
- Essential considerations for addressing BYOD complications
- Ways to protect data during mobile use and its critical nature in managing a successful BYOD program
WhistleBlower Security, Inc., seeks to improve ethics and integrity in business, government, and society. Their BYOD eBook offers nine important things companies need to consider if they encourage a BYOD culture.
Three key topics we like from 9 Important Items to Include In Your BYOD Policy:
- Legalities of BYOD
- Costs associated with BYOD
- Control over data when an employee leaves the organization
Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. Their guide to BYOD is a comprehensive 59-page document including a preface and nine sections, covering everything from an overview of BYOD to mobile access security.
Three key topics we like from The Definitive Guide to BYOD:
- Considering the challenges of BYOD
- The role of process automation in BYOD
- Auditing your existing infrastructure for BYOD readiness
Microsoft’s Bring Your Own Device (BYOD) Design Considerations Guide is a technical guide appropriate for system architects and system designers. The guide provides a collection of critical design considerations that need to be addressed prior to designing a BYOD infrastructure that allows employees to use their own devices and protects company data.
Three key topics we like from Bring Your Own Device (BYOD) Design Considerations Guide:
- Envisioning the BYOD infrastructure solution
- BYOD user and device considerations
- BYOD app considerations
SearchConsumerization,TechTarget’s consumerization of IT resource, covers mobile device management, security, BYOD policy, and more. Their guide to BYOD is a comprehensive resource that explains the basics and offers in-depth tips for administrators stuck at any level of a BYOD program.
Three key topics we like from Mastering the BYOD Trend: The Ultimate Guide:
- Understanding consumer device management and BYOD
- Create and enforce a BYOD policy
- BYOD challenges: app management, licensing, and compliance
Written by Aurelian Neagu, information security content writer at Heimdal Security, this guide to BYOD security outlines the advantages and disadvantages of BYOD and results from BYOD studies. He then details the 11 steps users can take to protect their own mobile devices if they are in a BYOD program.
Three key ideas we like from The 11-Step Guide to BYOD Security: How to Avoid Getting Fired:
- Install a good security product to protect your device
- Keep your software up to date and enable automatic updates for all of your apps
- Enlist the help of security experts from the IT environment to help minimize the risks on your own devices
Acronis’ BYOD survival guide includes 5 tips for practicing safe mobile file access and collaboration. The guide points out that BYOD exists because “personal mobile devices have infiltrated organizations all over the world, enabling everyone to work from everywhere.” Since BYOD is here to stay, organizations may as well know how to handle it appropriately.
Three key ideas we like from The BYOD Survival Guide:
- One important component of BYOD strategies is ensuring that information and records comply with privacy laws such as HIPAA and SOX
- By 2017, Gartner predicts that 50% of all companies will require employees to use their own mobile devices for work
- Mobile device security policies do not have to be complicated, but they need to encompass devices, data, and files
SmallBusinessComputing.com explains that small businesses need to make careful considerations before adopting BYOD programs. Their BYOD guide details everything small businesses need to know when making a mobile strategy decision.
Three key points we like from Hidden Cost, Hidden Danger? A Guide to BYOD:
- Small businesses need to keep in mind that they are responsible on some level for reimbursing the cellular and data costs employees incur in BYOD programs
- When evaluating BYOD costs, you need to figure in carrier costs, too
- All employees should agree to and sign a BYOD policy before allowing the use of personal devices for work
In their BYOD infographic, Bitdefender provides key facts and statistics about BYOD and its associated security risks to company data. The infographic breaks down the number of employees who share personal mobile devices, who are aware of BYOD policies, and other key factors affecting BYOD security risks.
Three key statistics we like from Evaluating Potential Security Risks to Company Data:
- 50% of employees have work data on their personal mobile devices, and the proportion is higher among those connecting their devices to the company network
- 71% of employed Americans who own personal mobile devices are able to connect them to the secure network provided by an employer
- 2/3 of employed Americans either don’t have the remote wipe function activated or don’t know about it
Jennifer Burnham, director of communications and content for Druva, shares this BYOD infographic to show how IT managers should consider recognizing the risks of BYOD and embrae it with the right solutions. By understanding the risks and realities associated with BYOD, companies can achieve a satisfied workforce and keep up with the pace of change.
Three key statistics we like from The Rise and Risk of BYOD: Understand the risks and realities of BYOD today:
- 74% of organizations expect a 2x – 10x increase in BYOD devices in 2 years
- 73% of enterprises are adopting mobile apps for their employees
- Only 7% of the 70 million devices lost or stolen each year are recovered
Rapid7 works to engineer better security to help companies reduce the risk of data breaches, detect and respond to attacks, and build effective cybersecurity programs. Their BYOD infographic, Invasion of the Mobile Monster, shows exactly how BYOD and mobile have taken off since 2009 and what the implications will be when more than 1.6 billion mobile devices are expected to be in the workplace by 2016.
Three key statistics we like from Invasion of the Mobile Monster:
- 79% of organizations see the need to protect sensitive data, including in corporate email stored on employee devices
- Only 35% of companies in the U.S. have developed an acceptable mobile device usage policy
- 59% of organizations report that employees circumvent or disengage security features such as passwords and key locks
TEKsystems provides IT staffing solutions, IT talent management expertise, and IT services to help clients plan, build, and run their critical business initiatives. Their BYOD infographic visualizes the results of the TEKsystems survey of more than 1,500 IT leaders and 2,000IT professionals on the topic of BYOD.
Three key statistics we like from Bring Your Own Device Policies Propel Businesses Forward:
- Only 35% of IT professionals feel as though their organization’s BYOD policy is crystal clear
- 57% of IT leaders report that BYOD improves employee satisfaction by offering greater freedom of choice
- Roughly 75% of IT leaders and IT professionals believe their organization’s sensitive data is at risk due to end users accessing information from personal devices
GFI Software is a leader in powerful, award-winning IT solutions for small to mid-sized businesses. Their BYOD infographic by Chrstina Goggi, web marketing content specialist at GFI Software, is intended to help companies quickly understand the scope of implementing BYOD in order to give employees more freedom of choice and boost morale and business productivity.
Three key points we like from 16 Rules for BYOD Engagement:
- Passwords must meet IT complexity and rotation requirements
- Users must notify IT right away in the event of a suspected or real compromise, or if the device is stolen, lost, or misplaced
- The company has the right to wipe the device in the event of a breach, loss of device, termination or resignation, or for any other legitimate reason
Gartner is known for delivering technology-related insight their clients need to make the right decisions. Their on-demand webinar, The Real Economic Keys to BYOD, is one of those insightful resources, as it takes a look at the costs, savings, and productivity associated with BYOD. The webinar is hosted by Federica Troni, Gartner research director.
Three key topics we like from The Real Economic Keys to BYOD:
- Main elements of a BYOD program
- Essential criteria for analyzing the cost of BYOD programs
- How to maximize the benefits of a BYOD program
Cost: FREE for Gartner account holders
Fluke Networks’ on-demand BYOD webinar, Tips for Integrating BYOD With Your WLAN, takes a look at implementing BYOD in enterprise networks without compromising connectivity, security, or performance. Expert Stéphane Persyn explains best practices and helps you stay one step ahead of your users.
Three key topics we like from Tips for Integrating BYOD With Your WLAN:
- Considerations for planning and designing BYOD
- Proactively managing performance
- Troubleshooting tips
JAMF Software seeks to help the enterprise succeed with the Apple platform. Their BYOD webinar proposes a path for organizations looking to succeed with a BYOD program.
Three key topics we like from BYOD Made Manageable:
- The unique IT challenges posed by a BYOD program
- How to balance user privacy with good IT security
- Using tools for delivering a great BYOD experience for IT admins and users
Bradford Networks offers solutions for enabling secure network access for corporate-issued and personal mobile devices. In this BYOD webinar, moderator David Krebs of VDC Research and panelists Frank Andrus, CTO of Bradford Networks, Kevin Koster of Cloudpath Networks, and TJ Maan of Motorola Solutions, discuss the key strategies IT administrators should consider when implementing BYOD.
Three key points we like from Three Steps to Safe Bring Your Own Device (BYOD):
- BYOD increases employee mobility, responsiveness, and productivity
- BYOD lowers cost
- CIOs need to be cautious and ensure the devices do not pose security threats and vulnerabilities to their networks
Cisco Meraki delivers intelligent, cloud-managed networking that simplifies enterprise IT. Their recurring BYOD webinar, available Wednesday, July 22, Wednesday, August 5, and Wednesay, August 19, 2015, at 11am PDT, explores the unique concerns raised by supporting BYOD initiatives and security.
Three key topics we like from Secure BYOD & Guest Access:
- How to have visibility into BYOD
- How to provide secure guest access
- How to apply policies by device type, measure the impact of those devices across your network, and apply various settings
Cost: FREE registration
Apperian is the Mobile Application Management (MAM) company. Their BYOD webinar highlights the issues and best practices around managing the BYOD trend and features Christopher Willis, Verivo’s CMO, and Chuck Goldman, Apperian CSO.
Three key topics we like from Webinar Recap: BYOD Strategy:
- The current status of BYOD in the enterprise and the effect that it will have on your business
- Best practices for rapidly creating and updating cross-device mobile apps to support the wide range of devices carried by corporate users
- Insight into the benefits provided by an enterprise app store
Hosted by David A. Willis, VP Distinguished Analyst, The Impact of BYOD is a Gartner webinar that shares the lessons learned from early BYOD adopters. The webinar also examines the economics of BYOD and provides practical advice for building a BYOD strategy.
Three key topics we like from The Impact of BYOD:
- The effects of the BYOD trend
- BYOD best-practice policies for organizations
- Investments for ensuring the safety of data and productivity for workers
Cost: FREE for Gartner account holders
Presented by New Signature, this BYOD webinar is available online and is appropriate for CIOs, CTOs, IT executives, and IT professionals. The nearly hour-long webinar features New Signature CTO Reed Wiedower and explores how Enterprise Mobility Suites (EMS) help organizations and their BYOD programs.
Three key topics we like from BYOD (Bring Your Own Device) 101:
- EMS enable people to be productive with a broad array of devices with access to the applications they need
- EMS unify IT environments with a common identity across on-premises and the cloud
- Protect your data with a comprehensive set of access control and data protection capabilities through EMS
This BYOD white paper from MaaS360 explores how BYOD offers employees and corporations benefits. Written like a guide, the white paper describes how BYOD can increase efficiency and control costs on provisioning a mobile workforce.
Three key topics we like from The Ten Commandments of Bring Your Own Device (BYOD):
- BYOD policy considerations
- Device discovery
- Enrollment best practices
When companies adopt BYOD programs correctly, the benefits are far reaching for both business owners and employees. There are challenges associated with BYOD for IT, but a BYOD approach is possible for organizations.
Three key points we like from BYOD Done Right: A Win-Win For Workforce Mobility Whitepaper:
- BYOD increases operational and business velocity that are no longer subject to time and place
- BYOD extends employees’ personal productivity and helps them balance their personal and work lives
- IT faces challenges in equitably facilitating workplace mobility across all of an organization’s factions
Citrix shares insights in cloud, mobile, virtualization, collaboration, and networking. Their BYOD white paper, Best Practices To Make BYOD Simple and Secure, serves as a guide to selecting technologies and developing policies for BYOD.
Three key ideas we like from Best Practices To Make BYOD Simple and Secure:
- BYOD programs result in more mobile and productive employees who are more satisfied
- IT eases its burden for endpoint procurement and management by shifting device ownership to employees and contractors
- BYOD can give people optimal freedom of choice while helping IT adapt to consumerization, plus address requirements for security, simplicity, and cost reduction
MTI Technology has been managing data securely for more than 25 years. Their BYOD white paper examines the various issues raised by BYOD and is geared toward IT security officers, network managers, and anyone else involved in running the security, data, and networks of an organization.
Three key points we like from Bring Your Own Device: The Future of Corporate Computing?:
- It is important to assess the risks BYOD poses to an organization, including network access, malware, data leakage, bandwidth, and breach of acceptable use policy
- BYOD policy is critical
- Any access to services should include authentication
VMware’s BYOD white paper, The BYOD Opportunity, encourages companies to “say ‘yes’ to device diversity and enable new ways to drive productivity.” The white paper points to the ways in which organizations can create a flexible, secure BYOD environment that increases efficiency, lowers operating costs, and drives productivity.
Three key points we like from The BYOD Opportunity:
- Solid planning is the first step of any successful BYOD implementation
- Companies should consider how a BYOD environment will change the way IT operates
- BYOD presents an opportunity for IT to contribute at a strategic level, as a driver of productivity
Aruba Networks’ BYOD white paper serves as a framework for successful BYOD initiatives. The fourteen-page document covers BYOD drivers, shortcomings of BYOD solutions, successful BYOD environments, and more.
Three key ideas we like from Conquering Today’s Bring Your Own Device Challenges:
- When users bring consumer devices to work, they expect to access business applications and content, and not jus the internet
- IT organizations need to make several considerations when exploring a BYOD initiative, including device and information overlap and security implications, application accessibility per user and per device, and enforcement of policies
- Adopting BYOD requires users to understand the implications of personal devices, the type of information that can be stored on them, and what is expected of them to meet pre- and post-authentication requirements
49. BYOD and Beyond
Aerohive’s BYOD white paper offers guidance on turning BYOD into productivity. BYOD and Beyond covers connecting users to the network, ensuring productivity for users, and raising the stakes in BYOD.
Three key ideas we like from BYOD and Beyond:
- Allowing users to bring their own devices to improve productivity and mobility are countered by the worry that devices are not secure, workers may be distracted by applications rather than using the device for work activities, and that an overwhelming burden will be placed on limited IT staff
- One of the most overlooked components of BYOD is how to manage users once they are on the network
- Once administrators decide on an authentication and access method, they need to ensure the connected devices follow the network guidelines, based on context such as identify, device, location, and time
Fujitsu’s BYOD white paper, BYOD – It’s About Infrastructure and Policies, examines the pros and cons, mandatory prerequisites, supporting workplace infrastructure, and other aspects of BYOD. The white paper seeks to offer guidance and insight to technology leaders as they explore BYOD for their organization.
Three key ideas we like from BYOD – It’s About Infrastructure and Policies:
- As digital natives enter the workforce, consumer technology has become part of enterprise IT
- Introducing BYOD means more flexibility for end users, as they have choice and freedom to use devices for work that fit their preferences, working style, and values
- There are challenges associated with BYOD, especially relating to manageability and security