Advisory Note: BYOD - 70335

Report Details

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit) consent. And ever since, IT departments have been worrying about losing control and how to halt the spread of privately owned mobile devices. Sadly, they are missing the point. They need to accept that smartphones and tablets are a fact of life in the networked economy, and that they are poised to proliferate far quicker than corporate IT departments can follow by adopting their new management tools. Instead of trying to stick their fingers in the dyke, IT professionals should concentrate of information security and accountability; things that are well within their reach even today.

Any viable BYOD strategy must cover all types of devices and operating systems. Any attempt to limit yourself to certain types of devices will automatically lead to a dead end; users will simply bring their own devices from home and there is now way IT can stop them. Yes, IT can block access to corporate networks and information, like it is done sometimes today. But over time, such a policy of locking your own people out will just not work.

BYOD will lead to a fundamental shift in areas such as desktop management, endpoint security man-agement, and information security management. Since users will increasingly choose to access corporate applications and information from their own, uncontrolled devices, IT departments would be well advised to follow an information-centric strategy versus the traditional, device-centric approach to security.

The best way to limit the risks of BYOD is to define clearly which information can be accessed by whom and under which circumstances, and then to make sure these policies are monitored and logged. And yes, some information should not be made available on BYOD devices. Enterprises and organizations must focus on technologies that best provide information security in a BYOD world and then execute on them as quickly as possible.
You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jul 12, 2011

Advisory Note: BYOD - 70335

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)…

€295.00 Get Access

Latest Related Reports

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR as opportunity to build trusted relationships with consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00