Click me
Transcribed

Best Practices in BYOD

Best Practices in BYOD [Bring Your Own Device] In order to avoid the BYOD Tax. enterprises need to architect their BYOD program with the right set of constructs that enables the appropriate degree of end-user preference resulting in increased productivity and satisfaction while ensuring that the total cost of ownership (TCO) of enterprise mobility is not negatively impacted. 1 End-User Segmentation Step 1 Segment users by different criteria Location Task Worker: Day Extender Natural usage patterns Knowledge Warker I: VIP Business requirements Knowledge Warker 2: Home Office Worker Data / Systems access Power User I: Field Sales Force Regulatory compliance Power User 2: International End-user contribution Power User 3: Field Force Step 2 Step 3 Establish: • support levels • expense levels • governance parameters Capture: application usage systems access requirements data access requirements 2 Define Financial Liability by Segment "More than half of US information workers pay for their smartphones and monthly plans, and three-quarters pick the smartphone they want rather than accept IT's choice. Source: December 2. 201l Farrester report Consumerization Drives Smartphone Proliferation What Is Financial Liability? The process of establishing who contracte with the wireless carriers for the service plan. Corporate liability is when the enterprise establishes the carrier relationship and financial responsibility for the plan. Individual liability is when the end-user contacts directly with the wireless carrier. Best-in-class enterpries are implementing a hybrid approach to financial liability. Knowledge worker and power user segments that need data access fall under corporate liability in order to mitigate the risk of escalating costs of individual service plans. For task worker segments that simply extend their day and use email as the killer application then individual liability and a flat stipend is an effective method. 3 Technology Alignment and Device Choice Enterprise Mability Roadmap Best in class enterprises support end-user choice to a certain dagree yet place some limits on what they'll support in the BY00 program. Overall IT Roadmap Aligning technology portfolia for each end-user eegment. Create a matrix of devices, technologies, services, support and associated costs denignated for each end-user sagment. Revisit the enterprie mobila portfolio matrix on a quarterly basis to keep up with the changing mobile landscape and enBure you're aupporting the best technology set. 3.5 Average number of mobile devices a worker is connected to 2.7 DI 2011 02 2012 Mobile Device Management (MDM) applications • Eneure policy Gompliance of devices functionality, including: connecting to corporate auset management IT infraetructure Eliminate security threats You need an MDM solution with basaline encryption paeeword poliey • remote lock/wipe • email/Wi-Fi/VPN configuration 4 Policy Development More than 40% of enterprise mobile devices are connecting to corporate systems without the knowledge of the IT department >40% Setting up a strong and detailed BYOD policy, which comes in accordance with the Electronic Communication Provacy Act and the state and local government laws is crucial for an enterprise. Notify employees and have their written agreement that if they choose to participate in the program, they will have MDM software installed by IT in their devices. The employees will have to agree to certain rules, such as: • not operating a mobile device while operating a vehicle • the use of cameras, unapproved content and removable media BYOD policy should include criteria for the different segments based on: Systam access parameters • Data loss prevention Corporate data management Corporate or individual liability • Financial responsibility 5 Security >20% 20% of organizations raport laptop or mobile device theft as being the second most common type of security incident. 2011 study on IT security practices MDM, Data Loss Prevention (DLP) and Mobile Davice Security solutions should deliver: • Asset and identity management Storage controls • Network access controls Application policy controls Permissions • Authentication Password settings Move, add and change management • Unauthorized usage alerts • Wab and messaging security 6 Support Support level should be based on: Clear policy on: End-user segment • The value they deliver Device replacement processes • Financial liability Conclusion By incorporating the 6 best practices outlined above, you will be developing a holistic approach to BYOD that will embrace technological innovation while delivering a satisfied, productive and secure mobile connected workforce. Source: www.ovationwireless.com 1-866-207-211 and White Paper at http://www.ovationwireless.com/ovation-white-papers-articles/bring-your-own-device-byod-enterprise-mobility/ best Practice

Best Practices in BYOD

shared by Fraas on Jun 30
119 views
0 shares
0 comments
BYOD is taking over enterprise mobility environments and the corresponding increase in costs and security risks are quickly becoming too much for enterprise IT departments to handle. Download our BYOD...

Tags

None.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size