BYOD---If U Want to access your official mails or applications on Tables/Iphone/Smartphones in Work Place :) :) :)



What is BYOD? 

 [BYOD] is about being innovative and helping your employees to work better.

As many IT departments struggle to keep up with yearly technology changes, company employees increasingly want to use their own devices to access corporate data.
As part of this consumerisation, BYOD encourages company employees to work on the device they choose - accessing corporate email on their  own PCs, smart phones or tablets or Other mobile devices.
The goal is to Increase productivity and reduced costs.

Why BYOD??
The driving force behind BYOD is a new IT self-sufficiency among company employees who already own and use personal laptops, tablets and smartphones.
These mobile devices are often newer and more advanced than the equipment deployed by many IT departments. It's hardly surprising that the rapid adoption of lightweight Ultrabooks, iPads and large-screened phones are changing the way that people want to work.

BYOD benefits and advantages
There are some key advantages to operating a BYOD strategy, including increased employee satisfaction (they can work more flexibly), cost savings (reduced hardware spend, software licensing and device maintenance) plus productivity gains (employees are happier, more comfortable and often work faster with their own technology).
By enabling employees to securely and easily access corporate data on their own device, productivity levels will naturally increase. In terms of cost savings, there are huge benefits, since SMBs will not have to manage and fund a second device for employees.



BYOD risks and disadvantages
Security and the loss of devices with limited password protection is naturally a key concern.
"Increased consumerisation in the workplace can bring with it an increased risk from threats such as hackers and viruses.
Android devices can be complex to manage as there are just so many different flavours - a huge variety of devices and a number of different versions of the operating system

Implementing a BYOD policy
Only provide what is required.
Beyond passcode-protecting employee devices, these policies might involve encrypting sensitive data, preventing local storage of corporate documents and/or limiting corporate access to non-sensitive areas
"Invest in a solution such as Good for Enterprise that offers BES (Blackberry Enterprise System)-like functionality to Apple and Android devices, partition all corporate applications and data on devices to restrict the ability to 'cut and copy', enforce eight digit alpha-numeric passwords with a special character and install VMware or Citrix virtual clients on tablets."

Comments

Popular posts from this blog

Upgrading the firmware on a standalone Fortigate unit or units in an HA cluster

Traffic Shaping With Fortigate