Top 50 BYOD Resources – BYOD Security, Policy, Trends & More - ClickSoftware

ClickSoftware Blog

Top 50 BYOD Resources – BYOD Security, Policy, Trends & More

July 21, 2015 Robert Stanley 1 Comments

byod-cta

There are several advantages to implementing a bring your own device (BYOD) program in your organization, including lower overhead and giving employees the opportunity to work on devices with which they are most comfortable. There are challenges with BYOD, though, that should be considered when making the BYOD plunge. To help your organization wade through all of the BYOD noise and make the best decision for your workforce, we have compiled a list of top BYOD resources.

We have selected articles, eBooks, guides, infographics, webinars, and white papers to help you along your BYOD journey. The resources on our list feature executives, IT professionals, top tech companies, and other thought leaders who have experience with implementing and guiding a BYOD program, as well as those who have collected data on and analyzed existing BYOD programs to offer their advice and expertise on BYOD.

While we have listed our top 50 BYOD resources below in no particular order, we have included a table of contents to make it easier for you to jump to the resource categories that most interest you.

Jump to:


Articles

1. How to Make BYOD Work

@ZDNet
@the_pc_doc

How to Make BYOD Work

ZDNet delivers round-the-clock news coverage and analysis on the trends and technologies that matter most to IT professionals and decision makers. In this BYOD article, Adrian Kingsley-Hughes, ZDnet contributor and internationally-published technology author, explains how BYOD works, especially when employers have a clearly-defined BYOD policy in place.

Three key points we like from How to Make BYOD Work:

  • It is estimated that 50 percent of firms will demand that employees make use of BYOD by 2017
  • There are potential BYOD pitfalls that require both employee and corporate considerations
  • Effective BYOD policies cover acceptable use, authorized devices, support, security, reimbursement, and liability, risks, and a disclaimer

Cost: FREE

2. 5 Reasons Why BYOD Survived 2014 and Will Prosper in 2015

@TechRepublic
@willkelly

5 Reasons Why BYOD Survied 2014 and Will Prosper in 2015

 

A technical writer and analyst focused on enterprise mobility, BYOD, and IT consumerization, Will Kelly explains how BYOD experienced some criticism in 2014 but looks as though it could thrive in 2015. He explores the innovation that is driving BYOD and how it could surpass other industry analysts’ predictions.

Three key points we like from 5 Reasons Why BYOD Survived 2014 and Will Prosper in 2015:

  • More cloud and enterprise mobility helps to justify employee and contractor BYOD use, especially because their devices don’t touch network endpoints
  • Employers will see fewer reasons to pay for mobile devices and related expenses as the hiring of contractors and other temporary workers rises in 2015
  • The 2014 California BYOD lawsuit prompted companies to make strategic acquisitions enabling businesses to support split billing or dual billing of calling minutes and data on BYOD devices between the employer and employee

Cost: FREE

3. Bring Your Own Dilemmas: Dealing with BYOD and Security

@USATODAY
@eweise

Bring Your Own Dilemmas Dealing with BYOD and security

 

Elizabeth Weise covers computer security, technology, and Silicon Valley for USA Today. In this USA Today piece, Weise explores the conundrum of employees using “the technology they already own and love for work, while also keeping vital corporate data and systems secure.” She also shares information from surveys and reports about how companies and employees handle BYOD.

Three key statistics we like from Bring Your Own Dilemmas: Dealing with BYOD and Security:

  • A survey found that 61% of companies had employees using personal smartphones or tablets for work-related activities
  • 50% of companies plan to move exclusively to BYOD for smartphones in 2017
  • 42% of companies required employees to have a security app installed, and only 19% required mandated security supplied by the company

Cost: FREE

4. Survey: BYOD Security Remains Spotty, With Users Unaware or Unmotivated About Risks

@pcworld
@GetTechSpective

Survey BYOD Security Remains Spotty with Users Unaware or Unmotivated About Risks

In this BYOD article for PCWorld, Tony Bradley, editor in chief of TechSpective.net, explores the results from a BitDefender survey that suggests BYOD policies and controls are not secure enough. 1,045 Internet users were surveyed, and the results “should be a wake-up call for companies to examine their BYOD policies, and ensure that adequate security controls are in place to safeguard corporate data and resources.”

Three key points we like from Survey: BYOD Security Remains Spotty, With Users Unaware or Unmotivated About Risks:

  • BYOD is an accepted norm, as more than half of employees who are permitted to use their own smartphones, tablets, or laptops do so
  • Half of US employees store work-related data on their personal mobile devices even when there is no BYOD policy
  • One of the most important security tools for mobile devices that store company data is the ability to remotely wipe sensitive information in the event the device is lost or stolen, yet 2/3 of US employees don’t know the remote wipe capability exists or have not yet activated it

Cost: FREE

5. The Good & Bad of BYOD

@DarkReading
@MrsYisWhy

The Good & Bad of BYOD

Dark Reading offers news and information on IT security and helps information security professionals manage the balance between data protection and user access. In this Dark Reading BYOD article, Michele Chubirka asserts that BYOD is more about security, organizational politics, and human psychology than it is about technology.

Three key points we like from The Good & Bad of BYOD:

  • IT departments spend a great deal of time dealing with users who demand more freedom of choice in how they use technology for their jobs
  • Users get frustrated when they have specific needs driven by their job or personally own better technology, but they can’t get anyone in IT to meet them halfway
  • Embracing BYOD can increase risks, but denying consumerization trends is even more dangerous for organizations, so security teams should stop trying to fight reality and understand that their role is in facilitating the business and BYOD rather than obstructing it

Cost: FREE

 6. A Big Step for BYOD: Separate Billing for Smartphones Is Finally Here

@infoworld
@MobileGalen

A Big Step for BYOD Separate Billing for Smartphones is Finally Here

InfoWorld has long been a source for expert, in-depth analysis of enterprise tech for technology decision makers and business leaders. In this BYOD article, InfoWorld executive editor Galen Gruman explains how major steps are being taken in separating work and personal communications to make BYOD a more sensible practice.

Three key points we like from A Big Step for BYOD: Separate Billing for Smartphones Is Finally Here:

  • One top corporate objection to BYOD has been the overhead associated with managing employee expense reimbursements and the added cost of paying full smartphone plans to avoid the accounting overhead
  • True BYOD means employees choose a compatible device and use the best network for them, but previous services have allowed separate work billing for smartphone voice and data use only when employees had the same carrier as their company
  • AT&T Work Platform makes it easier for companies to easily separate voice and text usage for work from that used for personal purposes, creating a real separation for compliance purposes between work and personal communications and becoming a more valuable option than splitting the bill

Cost: FREE

7. BYOD Is Saving Serious Money for IT

@NetworkWorld
@apatrizio

BYOD Is Saving Serious Money for IT

NetworkWorld is a premier provider of news, intelligence, and insight for network and IT executives. In this NetworkWorld BYOD article, freelance tech journalist Andy Patrizio shares how Gartner finally is measuring real dollar savings for companies using BYOD programs.

Three key points we like from BYOD Is Saving Serious Money for IT:

  • Gartner found that IT departments can support nearly three times as many users in BYOD tablet programs than company-purchased tablet programs
  • According to Federica Troni, research director at Gartner, “Without a stipend, direct costs of user-owned tablets are 64% lower. When organizations have several users who want a tablet as a device of convenience, offering a BYOD option is the best alternative to limit cost and broaden access.”
  • The savings almost all come from acquisition costs, so companies should design BYOD programs around a primary goal, such as user satisfaction, cost reduction, or mobile expansion

Cost: FREE

8. The Main Obstacles To BYOD Mass Adoption

@BetaNews

The Main Obstacles to BYOD Mass Adoption

BetaNews delivers up-to-date insight and analysis of the information technology industry and its role in economy and society. In this BetaNews BYOD article, Daniel Alarcon outlines the major reasons that BYOD is not yet a completely standard accepted business practice.

Three key points we like from The Main Obstacles To BYOD Mass Adoption:

  • Data security is the number one problem of implementing BYOD in the workplace
  • Privacy concerns are valid for both employees who want to keep their personal photos, texts, and phone calls away from employers and companies who want to keep their data away from unauthorized users and hackers
  • The costs of compliance to ensure BYOD policies work for the company are expensive

Cost: FREE

9. BYOD: What To Expect in 2015

@ITProPortal

BYOD What to Expect in 2015

Abby Perkins writes about jobs, workplace culture, and business solutions at Talent Tribune. In this BYOD article for ITProPortal, she describes BYOD as being “officially mainstream,” since the number of employees using their own smartphones for work-related activities is expected to rise from approximately 33% to more than 60% by 2020. Yet, the major adoption of BYOD brings with it several changed business practices.

Three key points we like from BYOD: What To Expect in 2015:

  • Cyber liability insurance soon will become more mainstream as companies need to protect themselves as BYOD grows
  • Enterprise mobility management 9EMM) will mature throughout 2015 and blur the lines between information security and application security
  • BYOD will become a standard incentive offered to young prospective and current employees, as being able to use personal devices especially is important to millennials

Cost: FREE

10. Make BYOD Work: 9 Key Considerations

@InformationWeek
@ThomasClaburn

Make BYOD Work 9 Key Considerations

InformationWeek covers IT news and information for businesses that use technology, and this BYOD piece by Thomas Claburn, business and technology writer, describes how BYOD gives organizations advantages. While BYOD has inherent management challenges, its potential benefits are worthy of consideration.

Three key points we like from Make BYOD Work: 9 Key Considerations:

  • The benefits of BYOD include promoting productivity and potentially saving hardware costs
  • For BYOD programs to succeed, organizations need to involve all relevant departments, including finance, legal, human resources, and operations
  • Organizations, at the very least, should have a pilot program to evaluate BYOD

Cost: FREE

11. 5 Ways to Encourage BYOD and Keep Your Company Data Secure

@Entrepreneur
@CloudEntr

5 Ways to Encourage BYOD and Keep Your Company Data Secure

VP of Business Development and Strategy for CloudEntr at Gemalto, Tom Smith shares five ways to support BYOD adoption while keeping company data secure in this article for Entrepreneur. Smith explains that BYOD is moving beyond laptops and the workplace walls into everyday life, as more than 60% of employees access business-related information through mobile devices and the expanding wearables market presents new challenges for company security while bringing new functionality into the workplace.

Three key points we like from 5 Ways to Encourage BYOD and Keep Your Company Data Secure:

  • It is crucial for IT professionals to put a BYOD policy into place that educates employees on proper security protocols and dictates required enrollments
  • IT should take proactive steps to perform an audit and periodically petition employees to register new devices with IT, grant IT access, monitor privileges, install MDM software, and report the transition of old devices so that access and data can be removed
  • Create an addendum to your BYOD policy around wearables and educate employees on safe usage

Cost: FREE

12. Business Trends for 2015: The Mobile Workforce and BYOD Maturing

@techradar

Business Trends for 2015 The Mobile Workforce and BYOD Maturing

In this TechRadar BYOD article, David Langhorn, head of corporate and large enterprise at Vodafone UK, explains that tech must keep up with staff demands, especially as the mobile workforce and BYOD mature. He also explores some of the business trends that will shape 2015 in relation to BYOD.

Three key points we like from Business Trends for 2015: The Mobile Workforce for BYOD Maturing:

  • There is a projected uptake of tablets, and they will become even more prominent within large and small businesses
  • ICT providers will need to find ways to offer simple to manage, integrated, and converged services that support multiple devices and operating systems across fixed, mobile, and IT
  • 2015 will see a significant incrase in demand and investment among IT leaders for technology that supports a maturing BYOD environment and mobile workforce while ensuring optimal security

Cost: FREE

13. BYOD and Cloud Are Top Data Breaches and Malware Risks, Survey Shows

@CSOonline

BYOD and Cloud Are Top Data Breaches and Malware Risks, Survey Shows

In this BYOD opinion piece for CSO, Wisegate editor in chief Elden Nelson reports on the results of a Wisegate survey that sought to discover how difficult it is for companies to tighten IT security regarding BYOD. The survey also asked senior IT professionals about the biggest BYOD security risks and how the top minds in IT plan to combat them.

Three key points we like from BYOD and Cloud Are Top Data Breaches and Malware Risks, Survey Shows:

  • Over 51% of respondents included data breaches and malware, plus insider and outsider threat, BYOD management and security, and advanced persistent treats as their companies’ top risks
  • Savvy security teams will earn users’ trust by showing how companies only can monitor corporate data but don’t and cannot monitor anything else when it comes to BYOD
  • Security teams will need to shift from protecting devices to protecting data as BYOD programs take hold

Cost: FREE

15. Mobile Virtualization – Solving the BYOD Problem

@TrendLabs

Mobile Virtualization Solving the BYOD Problem

TrendLabs offers security news and information directly from the experts, and their Security Intelligence Blog focuses on threat news and information. In this BYOD post, chief technology officer Raimund Genes explores the possibility of using something similar to a Virtual Desktop Infrastructure (VDI) as a solution for BYOD data issues.

Three key points we like from Mobile Virtualization – Solving the BYOD Problem:

  • With a Virtual Mobile Infrastructure (VMI), the client on the phone will access a virtual mobile operating system running on company servers
  • When properly implemented, a VMI solution would not leave data at risk on the user’s device
  • VMI helps manage the risks associated with BYOD so that companies can reap all of the benefits of BYOD while reducing potential problems

Cost: FREE

16. There’s Still a Security Disconnect On BYOD

@Computerworld
@jaivijayan

There's Still a Security Disconnect on BYOD

Jaijumar Vijayan is an independent journalist and tech content creation specialist who covers data security and privacy, business intelligence, big data, and data analytics. In his Computer World BYOD article, Vijayan reports on the surveys that show many workers aren’t following the BYOD security policies their companies are implementing.

Three key points we like from There’s Still a Security Disconnect On BYOD:

  • Fewer than one in five companies report having controls in place for enforcing policies governing the use of personally owned mobile devices
  • On the whole, enterprise users say they will choose not to bring personal devices to the workplace if employers plan to install security software on them
  • More than half of the surveyed employees fear that companies would gain access to their personal data via corporate security tools

Cost: FREE


eBooks

16. Bring Your Own Device, an eBook from AVG

@AVGFree

Bring Your Own Device, an eBook from AVG

Mike Foreman, AVG’s general manager of SMB and an advocate of BYOD for small businesses, authored this BYOD eBook for AVG. The eBook serves as a guide for steering organizations through BYOD programs.

Three key ideas we like from Bring Your Own Device, an eBook from AVG:

  • The opportunity associated with BYOD for businesses
  • BYOD benefits by the numbers
  • BYOD Legal issues owners need to consider

Cost: FREE

 17. The Executive’s Guide to BYOD and the Consumerization of IT

@ZDNet
@TechRepublic

The Executive's Guide to BYOD and the Consumerization of IT

ZDNet offers a wealth of BYOD content, and to make it accessible and convenient, they have compiled it, along with content from TechRepublic, into this eBook, available as a PDF. The eBook covers how BYOD has reshaped the way IT is purchased, managed, delivered, and secured.

Three key ideas we like from The Executive’s Guide to BYOD and the Consumerization of IT:

  • BYOD adoption is on the rise
  • IT leaders and companies should not ignore BYOD
  • BYOD’s potential to increase worker productivity, create more flexible working environments, and reduce IT costs

Cost: FREE for registered ZDNet and TechRepublic members

18. 10 Things to Know Before Starting a BYOD Program

@glodigcit

10 Things to Know Before Starting a BYOD Program

The Global Digital Citizen Foundation strives to grow responsible, ethical citizens for the digital world. Their BYOD eBook, geared toward schools, offers a list of things to consider before starting a BYOD program.

Three key topics we like from 10 Things to Know Before Starting a BYOD Program:

  • Crucial considerations to make before diving into a BYOD program
  • Important questions regarding BYOD readiness
  • There are both challenges and rewards associated with BYOD programs

Cost: FREE

19. What BYOD Really Means For Your Sales Force

@getbase

What BYOD Really Means For Your Sales Force

Base offers its BYOD eBook, What BYOD Really Means For Your Sales Force, to sales organizaitons seeking to prepare for implementing a BYOD program. The eBook details how BYOD policies should specify expectations about keeping clients protected and guiding staff on using their own devices to benefit themselves and their organization.

Three key topics we like from What BYOD Really Means For Your Sales Force:

  • BYOD and the security of company data
  • How to know which devices to prepare for
  • Choosing applications that work best for BYOD

Cost: FREE

20. Making BYOD Work

@FierceMobileIT

Making BYOD Work

FierceMobileIT offers its BYOD eBook, Making BYOD Work, to show enterprises how to navigate the challenges associated with BYOD to make it work best. The BYOD challenges and issues covered in the eBook include those relating to management, support, security, and access control.

Three key topics we like from Making BYOD Work:

  • Knowledge necessary for considering a mobile device management or containerization approach to BYOD
  • Enterprise BYOD policies for enforcing security
  • The security threats and legal ramifications posed by BYOD

Cost: FREE

21. BYOD For Dummies

@VMware

BYOD For Dummies

This BYOD eBook from VMware delivers all of the facets you need to implement a successful BYOD program. Even if you have limited staff and IT budgets to support your BYOD program, it is possible to allow employees to bring their own devices to work.

Three key topics we like from BYOD For Dummies:

  • How to give users freedom while remaining secure and compliant
  • Various approaches to tackling BYOD
  • Tips for creating and starting a best-practice strategy for BYOD

Cost: FREE

22. The CIO Playguide for Secure BYOD

@ITSecurityWatch

The CIO Playguide for Secure BYOD

IT Security Watch provides answers about current security issues in email, internet, data, network, and mobile. Their BYOD eBook, The CIO Playguide for Secure BYOD, examines the ways in which mobile devices and collaboration present opportunities for organizations but challenges for IT.

Three key topics we like from The CIO Playguide for Secure BYOD:

  • Complications for IT executives in deploying processes and tools to mitigate security risks and assure compliance with BYOD programs
  • Essential considerations for addressing BYOD complications
  • Ways to protect data during mobile use and its critical nature in managing a successful BYOD program

Cost: FREE

23. 9 Important Items to Include In Your BYOD Policy

@WhistlBlowrSays

9 Important Items to Include in Your BYOD Policy-2

WhistleBlower Security, Inc., seeks to improve ethics and integrity in business, government, and society. Their BYOD eBook offers nine important things companies need to consider if they encourage a BYOD culture.

Three key topics we like from 9 Important Items to Include In Your BYOD Policy:

  • Legalities of BYOD
  • Costs associated with BYOD
  • Control over data when an employee leaves the organization

Cost: FREE

Guides

24. The Definitive Guide to BYOD

@ArubaNetworks

The Definitive Guide to BYOD

Aruba Networks is a leading provider of next-generation network access solutions for the mobile enterprise. Their guide to BYOD is a comprehensive 59-page document including a preface and nine sections, covering everything from an overview of BYOD to mobile access security.

Three key topics we like from The Definitive Guide to BYOD:

  • Considering the challenges of BYOD
  • The role of process automation in BYOD
  • Auditing your existing infrastructure for BYOD readiness

Cost: FREE

  1. Bring Your Own Device (BYOD) Design Considerations Guide

@Microsoft

Bring Your Own Device (BYOD) Design Considerations Guide

Microsoft’s Bring Your Own Device (BYOD) Design Considerations Guide is a technical guide appropriate for system architects and system designers. The guide provides a collection of critical design considerations that need to be addressed prior to designing a BYOD infrastructure that allows employees to use their own devices and protects company data.

Three key topics we like from Bring Your Own Device (BYOD) Design Considerations Guide:

  • Envisioning the BYOD infrastructure solution
  • BYOD user and device considerations
  • BYOD app considerations

Cost: FREE

26. Mastering the BYOD Trend: The Ultimate Guide

@SearchCoIT

Mastering the BYOD Trend The Ultimate Guide

SearchConsumerization,TechTarget’s consumerization of IT resource, covers mobile device management, security, BYOD policy, and more. Their guide to BYOD is a comprehensive resource that explains the basics and offers in-depth tips for administrators stuck at any level of a BYOD program.

Three key topics we like from Mastering the BYOD Trend: The Ultimate Guide:

  • Understanding consumer device management and BYOD
  • Create and enforce a BYOD policy
  • BYOD challenges: app management, licensing, and compliance

Cost: FREE

27. The 11-Step Guide to BYOD Security: How to Avoid Getting Fired       

@HeimdalSecurity
@aneagu1

The 11-Step Guide to BYOD Security How to Avoid Getting Fired

Written by Aurelian Neagu, information security content writer at Heimdal Security, this guide to BYOD security outlines the advantages and disadvantages of BYOD and results from BYOD studies. He then details the 11 steps users can take to protect their own mobile devices if they are in a BYOD program.

Three key ideas we like from The 11-Step Guide to BYOD Security: How to Avoid Getting Fired:

  • Install a good security product to protect your device
  • Keep your software up to date and enable automatic updates for all of your apps
  • Enlist the help of security experts from the IT environment to help minimize the risks on your own devices

Cost: FREE

28. The BYOD Survival Guide

@AcronisHome

The BYOD Survival Guide

Acronis’ BYOD survival guide includes 5 tips for practicing safe mobile file access and collaboration. The guide points out that BYOD exists because “personal mobile devices have infiltrated organizations all over the world, enabling everyone to work from everywhere.” Since BYOD is here to stay, organizations may as well know how to handle it appropriately.

Three key ideas we like from The BYOD Survival Guide:

  • One important component of BYOD strategies is ensuring that information and records comply with privacy laws such as HIPAA and SOX
  • By 2017, Gartner predicts that 50% of all companies will require employees to use their own mobile devices for work
  • Mobile device security policies do not have to be complicated, but they need to encompass devices, data, and files

Cost: FREE

29. Hidden Cost, Hidden Danger? A Guide to BYOD

@SmBizComputing

Hidden Cost Hidden Danger

 

SmallBusinessComputing.com explains that small businesses need to make careful considerations before adopting BYOD programs. Their BYOD guide details everything small businesses need to know when making a mobile strategy decision.

Three key points we like from Hidden Cost, Hidden Danger? A Guide to BYOD:

  • Small businesses need to keep in mind that they are responsible on some level for reimbursing the cellular and data costs employees incur in BYOD programs
  • When evaluating BYOD costs, you need to figure in carrier costs, too
  • All employees should agree to and sign a BYOD policy before allowing the use of personal devices for work

Cost: FREE

Infographics

30. Evaluating Potential Security Risks to Company Data

@Bitdefender

Evaluating Potential Security Risks to Company Data

In their BYOD infographic, Bitdefender provides key facts and statistics about BYOD and its associated security risks to company data. The infographic breaks down the number of employees who share personal mobile devices, who are aware of BYOD policies, and other key factors affecting BYOD security risks.

Three key statistics we like from Evaluating Potential Security Risks to Company Data:

  • 50% of employees have work data on their personal mobile devices, and the proportion is higher among those connecting their devices to the company network
  • 71% of employed Americans who own personal mobile devices are able to connect them to the secure network provided by an employer
  • 2/3 of employed Americans either don’t have the remote wipe function activated or don’t know about it

Cost: FREE

31. The Rise and Risk of BYOD: Understand the risks and realities of BYOD today

@druvainc

The Rise and Risk of BYOD Understand the risks and realities of BYOD today

Jennifer Burnham, director of communications and content for Druva, shares this BYOD infographic to show how IT managers should consider recognizing the risks of BYOD and embrae it with the right solutions. By understanding the risks and realities associated with BYOD, companies can achieve a satisfied workforce and keep up with the pace of change.

Three key statistics we like from The Rise and Risk of BYOD: Understand the risks and realities of BYOD today:

  • 74% of organizations expect a 2x – 10x increase in BYOD devices in 2 years
  • 73% of enterprises are adopting mobile apps for their employees
  • Only 7% of the 70 million devices lost or stolen each year are recovered

Cost: FREE

32. Invasion of the Mobile Monster

@rapid7

Invasion of the Mobile Monster

Rapid7 works to engineer better security to help companies reduce the risk of data breaches, detect and respond to attacks, and build effective cybersecurity programs. Their BYOD infographic, Invasion of the Mobile Monster, shows exactly how BYOD and mobile have taken off since 2009 and what the implications will be when more than 1.6 billion mobile devices are expected to be in the workplace by 2016.

Three key statistics we like from Invasion of the Mobile Monster:

  • 79% of organizations see the need to protect sensitive data, including in corporate email stored on employee devices
  • Only 35% of companies in the U.S. have developed an acceptable mobile device usage policy
  • 59% of organizations report that employees circumvent or disengage security features such as passwords and key locks

Cost: FREE

33. Bring Your Own Device Policies Propel Businesses Forward

@TEKsystems

Bring Your Own Device Policies Propel Businesses Forward

TEKsystems provides IT staffing solutions, IT talent management expertise, and IT services to help clients plan, build, and run their critical business initiatives. Their BYOD infographic visualizes the results of the TEKsystems survey of more than 1,500 IT leaders and 2,000IT professionals on the topic of BYOD.

Three key statistics we like from Bring Your Own Device Policies Propel Businesses Forward:

  • Only 35% of IT professionals feel as though their organization’s BYOD policy is crystal clear
  • 57% of IT leaders report that BYOD improves employee satisfaction by offering greater freedom of choice
  • Roughly 75% of IT leaders and IT professionals believe their organization’s sensitive data is at risk due to end users accessing information from personal devices

Cost: FREE

34. 16 Rules for BYOD Engagement
@GFISoftware

16 Rules for BYOD Engagement

GFI Software is a leader in powerful, award-winning IT solutions for small to mid-sized businesses. Their BYOD infographic by Chrstina Goggi, web marketing content specialist at GFI Software, is intended to help companies quickly understand the scope of implementing BYOD in order to give employees more freedom of choice and boost morale and business productivity.

Three key points we like from 16 Rules for BYOD Engagement:

  • Passwords must meet IT complexity and rotation requirements
  • Users must notify IT right away in the event of a suspected or real compromise, or if the device is stolen, lost, or misplaced
  • The company has the right to wipe the device in the event of a breach, loss of device, termination or resignation, or for any other legitimate reason

Cost: FREE

Webinars

35. The Real Economic Keys to BYOD

@Gartner_inc

The Real Economic Keys to BYOD

Gartner is known for delivering technology-related insight their clients need to make the right decisions. Their on-demand webinar, The Real Economic Keys to BYOD, is one of those insightful resources, as it takes a look at the costs, savings, and productivity associated with BYOD. The webinar is hosted by Federica Troni, Gartner research director.

Three key topics we like from The Real Economic Keys to BYOD:

  • Main elements of a BYOD program
  • Essential criteria for analyzing the cost of BYOD programs
  • How to maximize the benefits of a BYOD program

Cost: FREE for Gartner account holders

36. Tips for Integrating BYOD With Your WLAN

@FlukeNetWIFI

Tips for Integrating BYOD With Your WLAN

Fluke Networks’ on-demand BYOD webinar, Tips for Integrating BYOD With Your WLAN, takes a look at implementing BYOD in enterprise networks without compromising connectivity, security, or performance. Expert Stéphane Persyn explains best practices and helps you stay one step ahead of your users.

Three key topics we like from Tips for Integrating BYOD With Your WLAN:

  • Considerations for planning and designing BYOD
  • Proactively managing performance
  • Troubleshooting tips

Cost: FREE

37. BYOD Made Manageable

@JAMFSoftware

BYOD Made Manageable

JAMF Software seeks to help the enterprise succeed with the Apple platform. Their BYOD webinar proposes a path for organizations looking to succeed with a BYOD program.

Three key topics we like from BYOD Made Manageable:

  • The unique IT challenges posed by a BYOD program
  • How to balance user privacy with good IT security
  • Using tools for delivering a great BYOD experience for IT admins and users

Cost: FREE

38. Three Steps to Safe Bring Your Own Device (BYOD)

@BradfordNet

Three Steps to Safe Bring Your Own Device (BYOD)

Bradford Networks offers solutions for enabling secure network access for corporate-issued and personal mobile devices. In this BYOD webinar, moderator David Krebs of VDC Research and panelists Frank Andrus, CTO of Bradford Networks, Kevin Koster of Cloudpath Networks, and TJ Maan of Motorola Solutions, discuss the key strategies IT administrators should consider when implementing BYOD.

Three key points we like from Three Steps to Safe Bring Your Own Device (BYOD):

  • BYOD increases employee mobility, responsiveness, and productivity
  • BYOD lowers cost
  • CIOs need to be cautious and ensure the devices do not pose security threats and vulnerabilities to their networks

Cost: FREE

39. Secure BYOD & Guest Access

@meraki

Secure BYOD & Guest Access

Cisco Meraki delivers intelligent, cloud-managed networking that simplifies enterprise IT. Their recurring BYOD webinar, available Wednesday, July 22, Wednesday, August 5, and Wednesay, August 19, 2015, at 11am PDT, explores the unique concerns raised by supporting BYOD initiatives and security.

Three key topics we like from Secure BYOD & Guest Access:

  • How to have visibility into BYOD
  • How to provide secure guest access
  • How to apply policies by device type, measure the impact of those devices across your network, and apply various settings

Cost: FREE registration

40. Webinar Recap: BYOD Strategy

@Apperian

Webinar Recap BYOD Strategy

Apperian is the Mobile Application Management (MAM) company. Their BYOD webinar highlights the issues and best practices around managing the BYOD trend and features Christopher Willis, Verivo’s CMO, and Chuck Goldman, Apperian CSO.

Three key topics we like from Webinar Recap: BYOD Strategy:

  • The current status of BYOD in the enterprise and the effect that it will have on your business
  • Best practices for rapidly creating and updating cross-device mobile apps to support the wide range of devices carried by corporate users
  • Insight into the benefits provided by an enterprise app store

Cost: FREE

41. The Impact of BYOD

@Gartner_inc

The Impact of BYOD

Hosted by David A. Willis, VP Distinguished Analyst, The Impact of BYOD is a Gartner webinar that shares the lessons learned from early BYOD adopters. The webinar also examines the economics of BYOD and provides practical advice for building a BYOD strategy.

Three key topics we like from The Impact of BYOD:

  • The effects of the BYOD trend
  • BYOD best-practice policies for organizations
  • Investments for ensuring the safety of data and productivity for workers

Cost: FREE for Gartner account holders

42. BYOD (Bring Your Own Device) 101

@newsignature

BYOD (Bring Your Own Device) 101

Presented by New Signature, this BYOD webinar is available online and is appropriate for CIOs, CTOs, IT executives, and IT professionals. The nearly hour-long webinar features New Signature CTO Reed Wiedower and explores how Enterprise Mobility Suites (EMS) help organizations and their BYOD programs.

Three key topics we like from BYOD (Bring Your Own Device) 101:

  • EMS enable people to be productive with a broad array of devices with access to the applications they need
  • EMS unify IT environments with a common identity across on-premises and the cloud
  • Protect your data with a comprehensive set of access control and data protection capabilities through EMS

Cost: FREE

White Papers

43. The Ten Commandments of Bring Your Own Device (BYOD)

@MaaS360

The Ten Commandments of Bring Your Own Device (BYOD)

This BYOD white paper from MaaS360 explores how BYOD offers employees and corporations benefits. Written like a guide, the white paper describes how BYOD can increase efficiency and control costs on provisioning a mobile workforce.

Three key topics we like from The Ten Commandments of Bring Your Own Device (BYOD):

  • BYOD policy considerations
  • Device discovery
  • Enrollment best practices

Cost: FREE

44. BYOD Done Right: A Win-Win For Workforce Mobility Whitepaper

@AirWatch

BYOD Done Right A Win-Win for Workforce Mobility Whitepaper

When companies adopt BYOD programs correctly, the benefits are far reaching for both business owners and employees. There are challenges associated with BYOD for IT, but a BYOD approach is possible for organizations.

Three key points we like from BYOD Done Right: A Win-Win For Workforce Mobility Whitepaper:

  • BYOD increases operational and business velocity that are no longer subject to time and place
  • BYOD extends employees’ personal productivity and helps them balance their personal and work lives
  • IT faces challenges in equitably facilitating workplace mobility across all of an organization’s factions

Cost: FREE

45. Best Practices To Make BYOD Simple and Secure

@citrix

Best Practices to Make BYOD Simple and Secure

Citrix shares insights in cloud, mobile, virtualization, collaboration, and networking. Their BYOD white paper, Best Practices To Make BYOD Simple and Secure, serves as a guide to selecting technologies and developing policies for BYOD.

Three key ideas we like from Best Practices To Make BYOD Simple and Secure:

  • BYOD programs result in more mobile and productive employees who are more satisfied
  • IT eases its burden for endpoint procurement and management by shifting device ownership to employees and contractors
  • BYOD can give people optimal freedom of choice while helping IT adapt to consumerization, plus address requirements for security, simplicity, and cost reduction

Cost: FREE

46. Bring Your Own Device: The Future of Corporate Computing?

@MTI_Technology

Future of Corporate Computing

MTI Technology has been managing data securely for more than 25 years. Their BYOD white paper examines the various issues raised by BYOD and is geared toward IT security officers, network managers, and anyone else involved in running the security, data, and networks of an organization.

Three key points we like from Bring Your Own Device: The Future of Corporate Computing?:

  • It is important to assess the risks BYOD poses to an organization, including network access, malware, data leakage, bandwidth, and breach of acceptable use policy
  • BYOD policy is critical
  • Any access to services should include authentication

Cost: FREE

47. The BYOD Opportunity

@VMware

The BYOD Opportunity

VMware’s BYOD white paper, The BYOD Opportunity, encourages companies to “say ‘yes’ to device diversity and enable new ways to drive productivity.” The white paper points to the ways in which organizations can create a flexible, secure BYOD environment that increases efficiency, lowers operating costs, and drives productivity.

Three key points we like from The BYOD Opportunity:

  • Solid planning is the first step of any successful BYOD implementation
  • Companies should consider how a BYOD environment will change the way IT operates
  • BYOD presents an opportunity for IT to contribute at a strategic level, as a driver of productivity

Cost: FREE

48. Conquering Today’s Bring Your Own Device Challenges

@ArubaNetworks

Conquering Today's Bring Your Own Device Challenges

Aruba Networks’ BYOD white paper serves as a framework for successful BYOD initiatives. The fourteen-page document covers BYOD drivers, shortcomings of BYOD solutions, successful BYOD environments, and more.

Three key ideas we like from Conquering Today’s Bring Your Own Device Challenges:

  • When users bring consumer devices to work, they expect to access business applications and content, and not jus the internet
  • IT organizations need to make several considerations when exploring a BYOD initiative, including device and information overlap and security implications, application accessibility per user and per device, and enforcement of policies
  • Adopting BYOD requires users to understand the implications of personal devices, the type of information that can be stored on them, and what is expected of them to meet pre- and post-authentication requirements

Cost: FREE

49. BYOD and Beyond

@Aerohive

BYOD and Beyond

Aerohive’s BYOD white paper offers guidance on turning BYOD into productivity. BYOD and Beyond covers connecting users to the network, ensuring productivity for users, and raising the stakes in BYOD.

Three key ideas we like from BYOD and Beyond:

  • Allowing users to bring their own devices to improve productivity and mobility are countered by the worry that devices are not secure, workers may be distracted by applications rather than using the device for work activities, and that an overwhelming burden will be placed on limited IT staff
  • One of the most overlooked components of BYOD is how to manage users once they are on the network
  • Once administrators decide on an authentication and access method, they need to ensure the connected devices follow the network guidelines, based on context such as identify, device, location, and time

Cost: FREE

50. BYOD – It’s About Infrastructure and Policies

@FujitsuAmerica

BYOD - It's About Infrastructure and Policies

Fujitsu’s BYOD white paper, BYOD – It’s About Infrastructure and Policies, examines the pros and cons, mandatory prerequisites, supporting workplace infrastructure, and other aspects of BYOD. The white paper seeks to offer guidance and insight to technology leaders as they explore BYOD for their organization.

Three key ideas we like from BYOD – It’s About Infrastructure and Policies:

  • As digital natives enter the workforce, consumer technology has become part of enterprise IT
  • Introducing BYOD means more flexibility for end users, as they have choice and freedom to use devices for work that fit their preferences, working style, and values
  • There are challenges associated with BYOD, especially relating to manageability and security

Cost: FREE

1 Comments

1 thought on “Top 50 BYOD Resources – BYOD Security, Policy, Trends & More”

  1. You blog is very cool, I haven’t tried these things to solve my problems. You have shared some very good info here. I found these tips very interesting and will surely try them and refer them to my friends.

Leave a Reply

Your email address will not be published. Required fields are marked *

post comment

Ready to transform your business? So are we.

Get started