Bring Your Own Device A Concept with ROI Potential Cortado White Paper
Contents BYOD - A Concept with ROI Potential ...................................................................................... 3 How can devices be securely integrated into the enterprise?..................................... 3
System Access Rights..................................................................................................................................3
Data and Transmission Encryption....................................................................................................3
Essential: Secure Devices with Passwords .................................................................................3
Viruses and Malware....................................................................................................................................4
The User as a Security Risk.....................................................................................................................4
Security Must be Managed......................................................................................................................4
Remote Connections .....................................................................................................................4 Container Solutions .........................................................................................................................5 Controlled Openness .....................................................................................................................5 More than just MDM: Use of the organization’s existing infrastructure, file sharing, and much more ......................................................................................................... 8
Who should take part in the BYOD program?...........................................................................8
It must be clarified: ........................................................................................................................................9
Control – What is allowed and what is useful?...................................................................... 10
Roundup ...............................................................................................................................................10
BYOD | April 2014 | www.cortado.com
2
BYOD - A Concept with ROI Potential The IT world is being transformed by BYOD: BYOD - Bring Your Own Device. Initially ridiculed by some, the idea has become an increasingly important concept. To put it simply – employees also use their private devices for business purposes. More and more organizations are discovering that it is essential they have a BYOD concept in place. Potential benefits include: ● Businesses can save 40 percent of their hardware costs according to Gartner ● Employees who use their private devices are more motivated ● E-mails and other documents can be dealt with outside of office hours ● Users know their devices and therefore require less training and technical
support ● Technology-savvy young employees, digital natives, are more inclined to work
for a company with a BYOD program ● Security and productivity can be actually increased by avoiding workarounds
How can devices be securely integrated into the enterprise? System Access Rights Just as for employees working at a stationary desktop workplace, decisions need to be taken about who will be able to access what data. Active Directory is of particular use in this area. Security comes first when dealing with smartphone and tablet integration into corporate IT.
In many cases, it is also useful to further limit the rights of mobile users, to prevent accidental deletion of files or data loss if a device happens to be lost or stolen. Data and Transmission Encryption Encrypted data transmission is the next mandatory security measure necessary to prevent unauthorized reading of data. Usually, SSL-encryption of data being transferred between the device and the network is sufficient. If additional security is deemed necessary, data can be embedded in a VPN tunnel or other proprietary tunnels such as Mobile Data Service (MDS).
Essential: Secure Devices with Passwords Mobile devices are often easily lost or stolen. An absolute must when it comes to secure integration of smartphones and tablets is to secure the device itself with the use of passwords. The length of passwords and the characters used, but also remote wiping the device after x number of failed attempts are just some of the options available to further increase password security.
BYOD | April 2014 | www.cortado.com
3
Download this white paper for free from the Cortado Corporate Server website today! http://bit.ly/1iHBVsq
www.cortado.com
Follow Cortado::
youtube