19
Fri, Apr
5 New Articles

BYOD: Implementing Mobile Devices in Your Company

Development Tools / Utilities
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Building a good mobile device policy is your best tool for successful BYOD implementation.

 

High-function/low-cost mobile information devices have changed the corporate IT environment in mysterious ways, not the least of which is a culture of "Bring Your Own Device (BYOD)."

 

BYOD is a growing phenomenon by which corporations permit employees to use personally owned mobile devices (laptops, tablets, and smartphones) in the workplace and to use those devices to access privileged company information and applications. This new paradigm would have been an anathema to security auditors only few years ago, but now BYOD has become the up-and-coming trend for managing data with portable devices.

 

According to Forrester Research, more than half of U.S. information workers now pay for their own smartphones and monthly service plans to do work for their employers, and three-quarters pick the smartphone they want, rather than accepting IT's choice. In high-growth marketssuch as Brazil and Chinathe ratio is greater than 75%.

 

What's even more startling is that Gartner estimates that 38% of companies expect to actually stop providing devices to workers by 2016 and that 85% of companies will be providing BYOD options for their employees. This means that only 15% of companies will prohibit the practice of using personal equipment to access corporate informationa security trend reversal that has many security analysts scratching their heads. The pace of change is extremely rapid, and though BYOD presents significant challenges to IT security, tech support, asset ownership, and equipment standards, corporations see it as a means of lowering costs for equipment and services by shifting the responsibilities for maintaining the equipment and services away from the corporate balance sheet.

BYOD and the Consumerization of IT

So what is BYOD, and how can IT control its influence in the organization?

 

A Bring Your Own Device (BYOD) program comprises corporate technology policies and procedures to provide a secure mobile computing environment on the devices employees want to use. But BYOD is not just a technology issue. It's also a central business issue that demands an effective approach encompassing business strategy, policies, and systems.

 

How did we get here? Employees have become increasingly accustomed to the concepts of self-serve IT. Things like Software as a Service (SaaS), cloud computing, and the manner by which mobile telephony is supported have transformed employee expectations of IT service. Instead of trying to solve problems through IT's help desk, these employees have become increasingly tech-savvy, with their own ideas of what their computing and communication devices should deliver. This trend paved the way to a consumerization of IT services, in which users choose the devices that best help them perform their jobs.

 

But now that BYOD is becoming more common, it's important to have the management in place to ensure that the use of personal equipment is both successful and secure. BYOD programs should reflect best practices that recognize and embrace the inevitability of so-called "consumerization," yet offer "built-in" flexibility and adaptability because those best practices are emerging and changing as quickly as the mobile environment.

Create a Policy

While the basic concept of BYOD seems simple, it's imperative that your company establish a written policy that meets management criteria before you start permitting employees to access data and services with their personal devices. The policy should specify what types of devices are permitted (cell phones, laptops, tablets, etc.) and how data plan payments will be managed (via stipend or expense report). Identifying the compliance regulations that govern the data managed by the organization should be documented in the policy, and the personnel records documenting an employee's acceptance of the formal policy should be maintained by the Personnel Department. Employees who will participate should sign off on the policy before they bring in their own devices.

Security and BYOD

Fundamentally, an IT department must develop practices that protect corporate data while maintaining employee productivity. This involves the participation and cooperation of other departments, including human resources, purchasing, legal, financial, and the lines of business that own the data. All policies about data protection need to be incorporated into the BYOD policy.

 

Still, there are a host of issues related to security, many of which may never have been addressed by the organization before.

 

For instance, what are the rules about accessing corporate data with an illegal device, such as a cell phone that's been jail-broken or a tablet that has been rooted? What about the use of apps that may compromise the security policies of the organization, such as a data-sharing app like Dropbox, an IP-scanning app, or even pirated apps? Should you permit a phone to access your system if its internal securities established by the phone vendor have been compromised? What should IT's response be if devices are discovered to be outside the security parameters established by the organization?

 

Security also extends to concern over the services that the device may be accessingfor instance, virtual private networks (VPNs), Software as a Service (SaaS), external email services, etc. Does the organization ban access to unauthorized services? Or does it establish policies to monitor the use of those services? If it does the latter, how does that impact the privacy of the employee?

 

Privacy itself is a security issue that is fraught with potential conflict. For instance, what data is the organization collecting about the use of the personal device? How is that data managed? Is there a strong demarcation between company-owned data and employee-owned data? How is that demarcation managed? What personal data is never collected?

 

All of these concerns should be identified in the BYOD policy, and the policy should be revisited on a regular basis as technology changes or challenges develop.

Setting Standards: Know What Your Users Want to Use

It would be nice if everyone wanted to use the same devices and those devices all had the same capabilities. But mobile technology is changing so quickly and new devices are coming into the public use so rapidly, it's impossible to predict which device will be the next hot item your employees will want to use. Instead of identifying devices, you need standards that identify the minimum services that a device should be able to manage. Still, those standards should be flexible.

 

For instance, setting an OS level for a cell phone is too restrictive, but standardizing around the ability to multi-task, send text messages, review video, and receive email sets a bar of functionality that empowers your employees. And don't sweat the technical details: if the functional standards are too high for an employee's device, they have the option of buying a new device with their own paycheck to meet the standard.

 

Some of the things that you should specifically consider:

 

  • How will you manage your mobile deployment in a BYOD world without risking sensitive data or intruding on employee's rights to      privacy on devices they own?
  • How will you distribute applications to and manage applications on employee devices?
  • How will you develop secure applications for mobile devices?
  • Will you have cross-platform (iOS, Windows Mobile, and Android) knowledge, tools, and apps?
  • What applications should you deploy—email, time and expense management, corporate directories, CRM?
  • Will you provide intranet access to BYOD users?

Simplicity and Self-Service

To be effective in your IT setting, your BYOD enrollment process should be simple to accomplish and simple to administer. This is the place where "self-service" by the employees becomes crucial. If the steps to enroll a device or to access a service are too complex, you've lost one of the primary management advantages of BYOD.

 

For instance, over-the-air (OTA) configuration (making access to email, contacts, calendars, VPN, corporate and public documents) should be easy to implement. What you don't want is some arcane process of individually loading software onto a device inside an IT cubicle.

 

Likewise, self-service should permit users to perform PIN and password resets, to locate lost devices through geo-location mapping services, and to wipe a lost device remotely. These self-service management processes can help remove some of the most common stumbling blocks of BYOD implementation.

Managing Information and Apps

Perhaps the largest challenge facing BYOD implementations is managing the data and the apps that are used on employee devices. There are, as yet, no well-established cross-platform information management packages that handle the mixture of data and apps in a rigorous, transparent, and secure manner.

 

Some of the things that a good management package for BYOD administration should do include:

  • Information IsolationKeep an employee's personal information separated from corporate data. You want the employee to be able to access corporate data, but you don't want the corporation to track or access the employee's personal data. How a proposed management system handles this co-mixing on a single device is important to protect the corporation from privacy infringement lawsuits.
  • Monitoring and MessagingWhen a device has been rooted or jail-broken, the system should be informed. Likewise, security policy breaches should be communicated between the system and the device. Standard upgrade info, such as the availability of a new app or new OS, should be managed through SMS or other automatic communication.
  • Data UsageWhen an employee's device approaches the limits of subscribed data usage, the system should be aware, and your      company's BYOD policy should specify how overage charges will be handled.

Open Up BYOD Bit by Bit

The promise of BYOD is to lower the cost of maintaining a mobile workforce by distributing the costs and the responsibilities to the employees themselves. But though the devices themselves are now affordable and readily availablewith employees raring to use their own devices in the service of the corporationit's best to roll out the policy in a limited manner while IT and management work through the potential problems. Start small, choose your employees and their devices wisely, and then accelerate as you gain experience.

 

BYOD implementations are new, and though there's plenty of enthusiasm and potential for a successful implementation, there's also plenty of time to get the policy right and the management packages in place before you run into problems.

Thomas Stockwell

Thomas M. Stockwell is an independent IT analyst and writer. He is the former Editor in Chief of MC Press Online and Midrange Computing magazine and has over 20 years of experience as a programmer, systems engineer, IT director, industry analyst, author, speaker, consultant, and editor.  

 

Tom works from his home in the Napa Valley in California. He can be reached at ITincendiary.com.

 

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: