Advisory Note: BYOD - 70335

Report Details

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit) consent. And ever since, IT departments have been worrying about losing control and how to halt the spread of privately owned mobile devices. Sadly, they are missing the point. They need to accept that smartphones and tablets are a fact of life in the networked economy, and that they are poised to proliferate far quicker than corporate IT departments can follow by adopting their new management tools. Instead of trying to stick their fingers in the dyke, IT professionals should concentrate of information security and accountability; things that are well within their reach even today.

Any viable BYOD strategy must cover all types of devices and operating systems. Any attempt to limit yourself to certain types of devices will automatically lead to a dead end; users will simply bring their own devices from home and there is now way IT can stop them. Yes, IT can block access to corporate networks and information, like it is done sometimes today. But over time, such a policy of locking your own people out will just not work.

BYOD will lead to a fundamental shift in areas such as desktop management, endpoint security man-agement, and information security management. Since users will increasingly choose to access corporate applications and information from their own, uncontrolled devices, IT departments would be well advised to follow an information-centric strategy versus the traditional, device-centric approach to security.

The best way to limit the risks of BYOD is to define clearly which information can be accessed by whom and under which circumstances, and then to make sure these policies are monitored and logged. And yes, some information should not be made available on BYOD devices. Enterprises and organizations must focus on technologies that best provide information security in a BYOD world and then execute on them as quickly as possible.
You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jul 12, 2011

Advisory Note: BYOD - 70335

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)…

€295.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00