Welcome!

Related Topics: Cloud Security, Java IoT, Mobile IoT, Linux Containers, Agile Computing

Cloud Security: Blog Post

Bring Your Own (Occasionally Connected) Device

Companies have tried many different ways to corral and control the flow of data from BYOD

This post is written in association with Dimension Data, an ICT services and solutions provider that uses its technology expertise, global service delivery capability and entrepreneurial spirit to accelerate the business ambitions of its clients. Dimension Data is a member of the NTT Group.

The so-called Bring Your Own Device (BYOD) phenomenon has gone hand in hand with the consumerization of IT trend. Both of which sound like strangely disconcerting and confusing terms if taken out of context or presented to a layman or novice for the first time.

Of course all we are talking about is users using devices in the workplace in the same ways and means that they have become used to when they are being consumers, i.e., not enterprise users.

BYOD Repercussions for #securemobility
It sounds simple on paper: lock down these BYOD devices at any ‘touchpoint' they have with the corporate network and, always, lock down the corporate network from the inside as robustly as possible.

Companies have tried many different ways to corral and control the flow of data from BYOD. One of the emerging trends appears to be the creation of enterprise app stores for business applications. Functioning in the same way as ‘App Stores' from some of the major vendors, the more formalized enterprise version is security protected and should be theoretically safer from the start.

But as we know, users are inherently curious by nature and they will typically still look to circumvent even enterprise app stores and/or use their own apps and data in ways that connect to the workplace.

For more information take a look at the findings of Dimension Data's global Secure Mobility Survey.

Centrally Controlled Command Consoles
Firms can do all the right things such as forming an end-to-end backup and recovery policy (which they really should do) and take steps to build in the most robust levels of enterprise security. Enterprise app store controls and central management of users' devices means that updates can be rolled out from a centrally controlled command console, which is all good news.

There's a strong efficiency argument here too. Managing the mobile application wave also means we can optimize every application to do the best job it can do at any one moment in time.

Workplace-as-a-Service Next?
The more we can manage these issues, the closer we can get to what we could even call Workplace-as-a-Service. Yes okay this is a case of yet more ‘jargonization' (is that not a word yet?) and industry-speak, but it makes the point very clear, i.e., we need to evidence and ‘own' control of our mobile applications layer.

Hopefully you picked up on that use of the word ‘own' in the last sentence. Ownership is crucial. Data ownership is all about understanding who owns what data and making sure employees are aware who owns what data on which devices.

Bring Your Own (Occasionally Connected) Device
This stuff is real and BYOD is a big mountain to climb. Even the still-emerging still-nascent technologies in this space are real. Your refrigerator, toaster and front door bell might not all be completely connected to the Internet of Things quite yet, but that time is not far off.

It won't be long before our BYOD concerns also stretch to the realm of Bring Your Own (Occasionally Connected) Device - if that is indeed what we might call the IoT-connected toaster.

This is the breadth of our security challenge today and we have a long way to go.

•   •   •

For more information on this discussion topic Dimension Data has published an Enterprise Mobility Survey Report to examine the critical gap that exists between the enterprise mobility vision and real-world implementations.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?