Bring-Your-Own-Device Presentation by Ravi Namboori Visit us @ http://ravinamboori.in
Bring-Your-Own-Device A technology trend that evolved to empower the workforce to use their own device to access enterprise data and systems.
Employee-owned devices such as Smart phones, tablets and personal laptops are allowed to use at work place.
Mobile devices are seamlessly integrated with enterprise corporate systems and networks.
Firms can leverage best from the BYOD programs by enabling IT teams to have proper usability to the systems anytime and anywhere remote accessing.
BYOD brings enhanced mobility in business critical processes.
Enterprise Policy…….. BYOD is an enterprise policy that enables:
Unlimited usage of personal devices in workplace
Employees access only non-sensitive data and systems from their personal devices
Enterprises have IT control on personal devices, data stored and applications as part of BYOD policy
BYOD policy objects local data storage on employees personal devices
Value addition areas………
Increased employee mobility
Better integration of employee personal and work lives
Brings quick turn around times and seamless interaction
Win-win scenario for both workforce and management
Developing BYOD Policy…….. While developing BYOD policy, enterprises need to consider the following:
Segmentation of users and decide on what depth of access should be given to each specific segment
What type of devices need to be permitted to access corporate data
Device specific security policies
Need of well-defined service policies
Defining use polices
BYOD - Business Benefits………..
Driving innovation in to workplace with handy smart devices
Improved employee job satisfaction
Enhanced efficiency and flexibility
Significant cost savings to enterprises as employees use their own devices to perform corporate tasks
Risks….. Though BYOD brings significant business benefits, enterprises need to consider full implications involved in allowing personal devices to access corporate data and systems
Data gets in to nefarious hands when the device with limited password protection is lost or stolen
Companies need to have thorough risk assessment and mitigation mechanism in place
BYOD could bring security vulnerabilities in to current secured environment
Security Policies…..
Enterprises need to develop stringent security policies to defend security threats from viruses and hackers.
Companies need to ensure all data protection commitments are fulfilled
Employees should be allowed to install specific applications in their devices
Data encryption techniques should be used while transferring data to and fro between corporate servers and personal devices
Things should be in place….
A dedicated team that includes personnel from IT, legal and human resource teams should monitor and ensure all the data protection and security standards are followed
Efficient monitoring mechanism is needed to monitor internet traffic on employee smart devices
Action plan to respond quickly to data breaches
Thank you Presentation by Ravi Namboori Visit us @ http://ravinamboori.in