BYOD isn't the end of the world

MENDY NEWMAN on August 04, 2014 | 1745

For IT professionals, the phrase “bring your own device” (BYOD), can raise feelings of fear or excitement, but why? This groundbreaking trend is changing the way many companies do business and presents a new way to improve productivity and reduce some costs around the office. However, because of the security challenges and alterations in operational mindsets, BYOD is still a much talked about topic these days.

According to a blog post by Jack Madden , though BYOD is getting a lot of attention, a business should only be concerned about how to keep data and apps secure for business and personal use, whether the end-user device is personal or corporate-owned . An uninformed business can easily made crucial mistakes that open up security loopholes and put the entire company infrastructure at risk. However, with the right tools and understanding of how to implement a BYOD solution safely and effectively, any business can benefit from it.

BYOD brings with it three fundamental challenges that a business needs to overcome: Securing data, securing apps and keeping personal and corporate data and apps separate. Luckily for many companies, the answer to these concerns is the same.

For addressing BYOD security and privacy, businesses can invest in a dual-persona mobile application management (MAM), solution or in remote access tools. Regarding the latter, rather than allowing employees to download data and enterprise apps to their personal devices, employees would use an RDP client to access those resources while they remain where they belong, hosted on the company server. This eliminates a significant amount of security-related worries while establishing a basis for access without restricting use based on device type.

“When iPhones first came into the enterprise, most of them came in as personal devices,” Madden wrote. “But things are different now, and many companies are issuing corporate iOS and Android devices to their employees. It would be easy for them to think, ‘Well, we’re dealing with iPhones [that] belong to the company now, so let’s just lock them down. They still get to use the devices they want, right?’ And of course that…would cause a user revolt, too!”

For many companies, enabling users with RDP-based access to hosted Windows applications and desktops is an answer to implementing a high-quality, secure, non-restrictive BYOD strategy. With a clientless HTML5 RDP client , employees can access data almost regardless of what kind of device they are using, and the data never leaves the server. This also keeps corporate property and private data and apps distinctly separate, eliminating the privacy concerns that can also plague a BYOD solution.

Industry news brought to you by Ericom Software, leaders in BYOD solutions.

Author | 122 Blog Posts

Mendy Newman

Mendy is the Head of Solution Management at Ericom for all its products. Mendy's team focuses on delivering implementation and architecture solutions to our customers worldwide. | Ericom Software

Recommended Articles