James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Rich Faille - Director of Mobility Practice

BYOD, Security, and You

Make Sure You Cover All Your Bases

|

By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

BYOD Security1. You can’t control everything on your employees’ personal devices. But you will have to put a plan in place for maintaining enough control over these devices. Draw up clear, restrictive usage policies.

2. There are 3 application architectures you can consider for managing the new fleet of devices: native mode, browser-based, and virtual mode. Find out which approach will work best for your organization—many organizations are now using a hybrid of native mode and virtual mode.

3. Since employee-supported devices will now contain a combination of personal and business data, you’ll need to outline a very clear End User Agreement (EUA). Be absolutely clear what the employee can and cannot do with their device when it is connected to your organization’s network.

4. You’ll also need a plan for handling lost or stolen devices. What types of data will likely be stored on employee-owned devices? Make sure to include plans to mitigate unauthorized access and data loss into your overall strategy.

5. In order to manage, track, and secure mobile devices you will need an MDM (Mobile Device Management) tool to ensure corporate polices and security are in place on every device. Most importantly, an MDM tool will allow you to delete corporate data if the phone is lost or the employee leaves the company. Depending on the MDM tool you choose, there are lots of other options and control functions you can use to get the most out of your mobile devices and BYOD environment.

 

For more in-depth information on implementing security policies for your BYOD strategy, take a look at our solutions story.


For more than 30 years, the PC Connection family of companies has been trusted to provide and transform technology into complete solutions. For more information, drop us a line.

Follow Us
RSS Feed
Featured Bloggers
Director of Practices and Initiatives for Enterprise Storage
James Nagurney - National Business Development Manager
National Business Development Manager
Lane Shelton - Vice President of Software Business Development
Vice President of Software Business Development