BYOD
bouts of the devices and the functionality they have to operate outside the organization’s desig- nated areas or sites requires very strict controls, if highly sensitive data is to be secure. For exam- ple, it is easy to install security software on mo- bile devices that can complete a remote wipe of all data in an emergency that either locks down or deletes any potential data on a stolen or lost device and makes the failure of recovery much less serious. However this exposes the business to poten-
tial problems, such as the cost of replacement (for the latest devices) and a lack of continuity – as personal devices have little protection of sensitive data without inherent inconvenience and cost.
The audit trail T e other major concern for the health sector over using BYOD technology is one of liability. Hospital owned systems are rigorously main- tained and updated to meet the highest levels
The right access at the right time
E
nterprises are at the ‘Bring Your Own’ (BYO) crossroads – BYO device, BYO network,
BYO App, BYO cloud. The list goes on. The reign of the PC or laptop as the preferred work device has come to an end, creating a consider- able challenge for enterprise CIOs and IT teams worldwide, both in terms of security issues and network access. And the risk is two-way – the risk of unauthorized access to sensitive information, both from an employer and employee perspective. What is required is a new enterprise network
strategy that breaks free from corporate barriers to gain increased agility – for the enterprise and for the employee.
Six key questions 1. Who owns the devices? The best option when deciding who owns the device is to partially subsidise employees’ device purchases. This can signifi cantly boost morale
About the author
Manish Sablok is head of marketing for CNE Europe at Alcatel-Lucent Enterprise
of quality demanded for such an important sec- tor, which deals with life and death situations. If members of staff use their own, unregulated devices as their primary method of communi- cations there are potentially serious gaps in the audit trail. A vital member of the operating staff , for
instance, will rely upon receiving information quickly and accurately to react to emergencies. If the BYOD fails to do this (perhaps through poor signal or another unforeseen problem), where do the hospital and the individual pro- fessional stand with regards to liability? Ultimately there are important benefi cial
ideas for the health sector to learn from the BYOD phenomenon, even if it is unlikely to be able to wholly embrace it. BYOD can show ways of working that are natural to workers, es- pecially younger workers who are more likely to choose their own communications methods and tools, but maintaining ultimate control over the outcome is the key.
and can encourage BYOD practices. Clearly a full subsidy approach may not be cost ef- fective, and no subsidy will lead to employee disengagement as a work tool.
2. What’s the right policy? Enterprises must establish a clear policy limiting the choice of devices for employees. But it is important to leave enough of a selection so that employ- ees still feel like they have a choice. Equally, enterprises can produce a recipe for disaster if no policies are set in place when a BYOD adoption begins.
3.What’s the employee’s role?Workshops are a great way to engage employees and educate those who are not familiar with a BYOD policy. It can be helpful to provide guidelines to help employees make the right device selection for the role they do.
4.What is the impact on IT? The best option when implementing a BYOD policy is to minimise the involvement of IT departments, without abandoning the workforce. By set- ting specifi c hours when IT will be available for assistance, or creating an internal site with FAQs, users have the support available when required, whilst still maintaining a centralised management solution for multiple devices.
5.How about applications? Enterprises should make a list of applications which are OK and not OK for the workplace. The ulti- mate objective is to make sure that productiv- ity is improved, so the process should ensure that the right people on the right devices can get to the resources they need.
6. How do we tackle security? Remember security is a two-way process protecting both companies and employees. Protect your
LAND mobile January 2013 It is unlikely that an ‘off -the-shelf ’ device
will be acceptable for critical healthcare com- munications, although there may be a place for it with regards to roles of a noncritical nature. However, modern healthcare-focused commu- nications systems can easily use the latest tech- nologies if they are ‘kiosked’ so that they have had additional functionality removed. T is controls data and prevents misuse but devices can still be furnished with all the data access tools required to benefi t from their capability to retrieve and display data. Effi ciency and performance in the health-
care industry comes from dedicated staff us- ing dedicated tools – the problem is one tool does not suit all. Allowing staff to use the right device for their needs, whether a smartphone or tablet, DECT phone or pager, all needs the careful control of a dedicated IT/telecoms department, to provide the right access, privacy and security demanded in a highly critical and important environment.
network. Start with a network audit before any implementation of a BYOD policy and ensure your network access is protected by keeping BYOD and corporate-owned devices on separate virtual networks. This way you manage access to your business information and protect your employees personal data. Network ac- cess control is a must-have for any BYOD enterprise, as security does not have to mean banning and compromising on productivity and employee engagement levels. By building a new network strategy based on these criteria, enterprises can truly leverage the BYOD trend to build improved freedom and mobility for employees, whilst ensuring security at all times.
The personal cloud The personal cloud is a by-product of the BYOD trend and its associated freedom. Consumers are starting to realise that as employees, there is a benefi t to having their personal clouds to support their professional lives on their chosen devices. They use these devices day-in, day-out in their personal lives in order to connect to the Internet and build personal clouds by select- ing applications that enable them to improve their communications experience or personal productivity. Having developed this environment in
the personal and social space, it should come as no surprise that employees would soon want to extend this into their work space. As a result, CIOs and IT departments need to now brace themselves for this new trend emerging as a by-product of BYOD.
27
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36