Welcome!

Related Topics: Mobile IoT, Microservices Expo, Agile Computing, Wearables

Mobile IoT: Article

Creating an Effective BYOD Policy

Six tips for success

Employees like the ability to choose.  Whether it be choosing the hours they work or whether or not they can telecommute to work, choosing makes them feel empowered, which tends to boost their job satisfaction.

Another area in which they enjoy being given choice is how they can communicate and collaborate.  To accommodate this choice, businesses will do well to implement a bring your own device (BYOD) policy.  This policy will allow workers to choose whatever mobile device they prefer to carry out many of their work-related functions.  One downside to BYOD is that CIOs have to face many challenges related to an abundance of mobile devices, none of which they have full control over, accessing internal networks.

At one time, mobile devices were mostly used to carry out simple communications between a wide array of mobile users, mostly through phone calls and texts.  Over the years, however, the popularity of applications has quickly made its way into the hands of almost all mobile device users.  These applications allow users to play games, edit photos, carry out personal and business tasks and much more.

It is estimated that by the year 2014, which is right around the corner, more than 90 percent of businesses will need to support a BYOD policy. Unfortunately, more than 50 percent of these businesses don't have a BYOD policy yet in place, let alone effective BYOD security standards.

When creating BYOD strategies, CIOs need to keep the following six considerations in mind:

1. Corporate Policies Need to Apply to BYOD
The same policies that are enforced for corporate-issued devices need to apply in the same way to BYOD devices. Without a consistent policy across all platforms, corporate chaos is almost guaranteed.

2. Initiate Syncing Requirements
There is much that can go wrong with a BYOD plan. For example, if an employee uploads data to his or her own wireless device but fails to sync it with other corporate devices, the data will only be available for viewing on the employee's device; this can cause much headache and frustration. All workers who are given clearance to view certain levels of corporate data need to be kept in the loop. To do this, syncing among all devices needs to take place on a daily basis.

3. Complexity Is a Given
With more mobile devices accessing a company network, it is only common sense that the complextity of software updates and authentication processes will be enhanced. Because of this, a company CIO needs to always have a plan in place to address these issues.

4. Wireless Traffic Will Increase
With an increase in wireless traffic to the implementation of a BYOD policy, a CIO needs to be aware that lower communications quality is likely to be endured. In addition, higher communication costs could prevail. To combat such issues, it is best to allow all wireless traffic to take place via a local Wi-Fi network.

5. Apps, Apps and More Apps
In addition to allowing employees to download company apps, there is a major benefit gained when allowing them to download third-party apps. With an app for almost everything these days, employees will enjoy being able to access apps that are directly delivered to them from their employers. CIOs need to remember, however, that regular monitoring of third-party apps needs to be conducted to ensure the security of a BYOD policy is being maintained.

6. It's Not Good to Get Comfortable
A traditional mobile security policy will not suffice for BYOD. An entirely new security policy needs to be created in order for BYOD to work well. Most importantly, the following three layers of defense need to be included within a BYOD policy:

  • Dual-factor authentication
  • Role-defined user policies
  • Virtual private network encryption

Naturally, each BYOD policy will be unique to every organization, but remembering these key points will help ensure that the BYOD policy is effective.

More Stories By Gil Allouche

Gil Allouche is the Vice President of Marketing at Qubole. Most recently Sr. Director of Marketing for Karmasphere, a leading Big Data Analytics company offering SQL access to Apache Hadoop, where he managed all marketing functions, Gil brings a keen understanding of the Big Data target market and its technologies and buyers. Prior to Karmasphere, Gil was a product marketing manager and general manager for the TIBCO Silver Spotfire SaaS offering where he developed and executed go-to-market plans that increased growth by 600 percent in just 18 months. Gil also co-founded 1Yell, a social media ad network company. Gil began his marketing career as a product strategist at SAP while earning his MBA at Babson College and is a former software engineer.

Latest Stories
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
In his session at @ThingsExpo, Sudarshan Krishnamurthi, a Senior Manager, Business Strategy, at Cisco Systems, will discuss how IT and operational technology (OT) work together, as opposed to being in separate siloes as once was traditional. Attendees will learn how to fully leverage the power of IoT in their organization by bringing the two sides together and bridging the communication gap. He will also look at what good leadership must entail in order to accomplish this, and how IT managers ca...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at @ThingsExpo, Steve Wilkes, CTO and founder of Striim, will delve into four enterprise-scale, business-critical case studies where streaming analytics serves as the key to enabling real-time data integration and right-time insights in hybrid cloud, IoT, and fog computing environments. As part of this discussion, he will also present a demo based on its partnership with Fujitsu, highlighting their technologies in a healthcare IoT use-case. The demo showcases the tracking of pati...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
SYS-CON Events announced today that Cloud Academy will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud computing technologies. Ge...