Printer Friendly

Building a BYOD Policy for Your Enterprise.

India, July 25 -- Defining a policy framework around BYOD to access right data, combined with right security measures will ensure higher productivity.

BYOD (Bring Your Own Device) as a concept provides freedom to employees in an enterprise to use multiple devices (enterprise owned or personal) to access different layers of enterprise data. The desire to have seamless user rich experience without any downtime is impacting the corporate networks tremendously and also posing a great security challenge to the CISOs.

This blend between the consumer and enterprise technologies is resulting in 'consumerisation' of IT, which has led many organisations to rethink their business models to promote agility and flexibility for their employees. At the same time, this enables an enterprise to remain competitive by significantly increasing their employees' productivity and satisfaction.

However, the key question that confronts the CIOs or the senior IT decision makers is how to make this BYOD trend more employee-friendly and put to productive use. Experts suggest that there are a few steps that they need to observe to adopt the trend with less hassle.

Key steps to make BYOD more organisation friendly

Most CIOs and IT managers echo the similar sentiment that the BYOD adoption increases productivity. A survey by Intel IT Centre much earlier revealed that majority of the IT managers had agreed that BYOD drove better worker productivity.

Much of the success of the BYOD trend will strictly depend upon BYOD policy and its alignment with security.

Security remains a big challenge for IT managers

In this journey of BYOD, the first issue that comes to the mind of IT manager is the security of corporate data. IT managers are challenged with providing an on-premises experience to a diverse set of remote workers - while protecting business-critical data and intellectual property.

Today, the IT managers know that they need to change their thinking and processes, using technology to minimise the impact on productivity without driving up business costs to support mobile workers - and ensure that the solution provides the flexibility to support business-continuity scenarios. IT managers need to address data and security management aspect in an enterprise, where asking right questions to HR and taking cognisance of the legal and compliance issues becomes critical.

Key areas that the IT managers need to focus for better productivity

Handling data: Before getting into how to ensure security, an important thing IT managers should first talk about is data. Since 'data' is what one needs to secure, it is important to first classify the existing types of data, and then decide the level of security for each type of data. The key points are:-

Classify data according to sensitivity and business impact; Differentiate access to data based on identity and role; and Change perspective from device control to data governance.

The above activity will help in defining a framework for Policy Based Access to Corporate Information. The following diagram gives an insight into how this can be achieved.

For instance, this can help in:

a) Providing a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies,

b) Users can access corporate data regardless of device or location with work folders for data sync and desktop virtualisation for centralised applications,

c) IT can publish resources using the web application proxy and create business-driven access policies with multi-factor authentication based on the content being accessed,

d) IT can audit user access to information - based on central audit policies.

Best approach to manage security

Device choice in the enterprise is creating a diverse, heterogeneous environment to manage. Unmanaged devices accessing the corporate network and confidential business resources pose a security risk, particularly in the event when the device is lost or stolen.

With System Center 2012 Configuration Manager SP1 and the Windows Intune working together, one can manage all of his/her devices from a single tool and gain visibility, enforce policies, and maintain control of a heterogeneous mobile device infrastructure.

Right measures to secure

It is a real problem these days, and the number one question we get around security and management with consumerisation is, "how can I manage devices other than Windows-based devices?" The reality is that any unmanaged device poses these risks, but for most of our customers today, this heterogeneous environment is a struggle.

We're helping in addressing the problem with System Center (for on-premises management) and Windows Intune (for management through the cloud) - and we're increasingly focusing on interoperability between the two. Through the administration console in System Center 2012 Configuration Manager SP1, you can add mobile devices managed through Windows Intune into your Configuration Manager console and manage all the devices through one tool. While you can continue to use Windows Intune as your 'fully in the cloud' management solution for PC and mobile device management, the interoperability of our on-premises and cloud services is a big step forward for organisations that want to manage all of their devices from one place.

Right solution

Let's understand as to how these two products help with security and management:

For a successful mobility and BYOD adoption, it is also important to look at all the Human Resource (HR) and Legal issues and appropriately update processes to mitigate any risks.

Reprinted/Republished with permission from:

Published by HT Syndication with permission from The CTO Forum.

Copyright HT Media Ltd. Provided by SyndiGate Media Inc. ( ).
COPYRIGHT 2014 SyndiGate Media Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2014 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:The CTO Forum
Date:Jul 25, 2014
Previous Article:Juniper Enhances Its DDoS Protection Solution.
Next Article:A Bit of Shadow IT is Sometimes Welcome.

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |