One of the largest challenges with
Bring Your Own Device (BYOD) is corporate data protection. If a notebook is used to access business applications and data, then that asset needs to be tightly controlled and subject to restrictive usage policies. IT must have a strategy to protect business data on all devices whether it is corporate managed or employee self-supported and managed. The challenge is how to permit a growing number of devices and capabilities to be used, while still maintaining security and enough control to enforce policies.
Evaluate Application Strategies Securing and preventing corporate data
loss is a top concern when implementing BYOD. There are 3 application architectures you can consider:
• In native mode, applications running on an employee-owned device communicate directly with the application server in the host data center or cloud. Data may be exchanged and stored directly on the device. • A browser approach gives any device
with a standard HTML capability access to applications. Much like in native mode, data may be exchanged and stored directly on the employee-owned device. This leads to security challenges and concerns about data loss. • In virtual mode, applications exist on an application server in the data center or cloud and are presented through a VDI client on a mobile device. Data is not
stored directly on the employee-owned device; only display information is exchanged and rendered on the device. This method provides maximum data security. It is important to make decisions
about which approach you will rely on for your application architecture. Many companies use a hybrid approach— using native mode for standard business applications and virtual mode for a subset of applications with stricter confi dentiality requirements.
Create an Encompassing End-User Agreement Another area that must be well
thought out prior to any BYOD implementation is the End User Agreement (EUA). Because you are mixing personal and corporate data it is critical to outline policies up front and be sure to communicate these to employees in advance. Many businesses regularly fi lter and monitor Internet access to ensure compliance with policies against accessing inappropriate websites at work. It’s also common to have policies against transmitting inappropriate emails while using a corporate-owned device or corporate network. The key to avoiding legal liabilities is
to notify, notify, and notify again. Make it clear to employees in a written policy that they must accept how the company will treat corporate and personal data and communications on their
employee-owned device. By agreeing to the EUA, make it clear what rights the employee is forfeiting to gain access to the network with an employee- owned device.
Develop a Lost or Stolen Device Policy Similar to the discussion about having a complete EUA in place, you should have a plan in place for how lost or stolen devices will be handled. Different solutions provide varying degrees of capabilities to reach out remotely and destroy data or applications to ensure they remain confi dential. Consider the types of data that are likely to be stored on employee-owned devices and integrate mitigation plans into your overall BYOD strategy before deployment.
Benefi ts of Secure BYOD Securing corporate data, applications,
and systems is essential to any BYOD strategy, and IT organizations need to ensure a secure experience from both a device and a network access perspective. Your secure BYOD solution can simplify IT operations with end-to-end network lifecycle management.
Excerpted from the Cisco whitepaper, "Bring Your Own Device: Device Freedom Without Compromising the IT Network."
TURN THE PAGE to learn about the latest BYOD solutions, and then give your Account Manager a call to get started with a secure BYOD plan for your organization.
Are You Ready for BYOD?
Prepare your network for Bring Your Own Device (BYOD) with our comprehensive suite of Network Services. We can identify the capabilities of your network with a Network Assessment and uncover weaknesses with a comprehensive Security Assessment.
• Our Network Assessment identifi es equipment that needs to be upgraded and pinpoints performance issues such as bottlenecks. We can provide remediation plans to fi x problems and optimize your network’s performance.
• Our Security Assessment provides a better understanding of your organization’s current security-focused infrastructure and presents recommendations on how to meet the needs and challenges of today’s network security landscape.
Our Network Services combine infrastructure, services, and applications to provide you with secure, dependable wired and wireless networks. Contact an Account Manager or visit
www.pcconnection.com/networkservices today for more information.
1.800.800.0014
www.pcconnection.com
3
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6