Advisory Note: BYOD - 70335
Report Details

Advisory Note: BYOD - 70335
July 12, 2011
July 12, 2011

Any viable BYOD strategy must cover all types of devices and operating systems. Any attempt to limit yourself to certain types of devices will automatically lead to a dead end; users will simply bring their own devices from home and there is now way IT can stop them. Yes, IT can block access to corporate networks and information, like it is done sometimes today. But over time, such a policy of locking your own people out will just not work.
BYOD will lead to a fundamental shift in areas such as desktop management, endpoint security man-agement, and information security management. Since users will increasingly choose to access corporate applications and information from their own, uncontrolled devices, IT departments would be well advised to follow an information-centric strategy versus the traditional, device-centric approach to security.
The best way to limit the risks of BYOD is to define clearly which information can be accessed by whom and under which circumstances, and then to make sure these policies are monitored and logged. And yes, some information should not be made available on BYOD devices. Enterprises and organizations must focus on technologies that best provide information security in a BYOD world and then execute on them as quickly as possible.
You can get access to this document for free, if you register for KuppingerCole Select access now.
Date | Title | Price | |
---|---|---|---|
Jul 12, 2011 |
Advisory Note: BYOD - 70335Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)… |
€295.00
excl. VAT
|
Get Access
![]() |
![]() ![]() ![]() ![]() |
Latest Related Reports
Stay Connected
Latest Research
Trending Videos
How can we help you