Pages: [1]   Go Down
  Print  
Author Topic: Three Common Strategies to Support BYOD  (Read 395 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: November 22, 2012, 03:01:29 am »

Three Common Strategies to Support BYOD
   




   

The easiest way to secure the network and protect company data is to simply not allow mobile devices to access company resources at all. Of course, that’s a highly impractical policy, and one that ignores the many benefits mobile devices bring to the table. You can block non-managed devices from connecting to the network, and you can lock down USB ports on company PCs, but it’s virtually impossible to ban employee-owned devices altogether.


That doesn’t mean you should just surrender and let the employees do whatever they like. There are pros and cons for both the company and the users when it comes to adopting a bring your own device (BYOD) policy, and users need to understand from square one that the tradeoff for being allowed to use their own smartphone or tablet for work is that the IT admin must be able to exercise some control to protect the network and sensitive company data.


In order to manage mobile devices effectively, you need to employ some form of mobile device management (MDM) tool. MDM gives IT admins the ability to manage security settings on mobile devices, track the mobile devices with access to the network, monitor compliance with company policies, and remotely wipe data from lost or stolen devices if necessary.


With MDM, you can apply a unique balance of access and security to fit your specific needs. Three ways to support a BYOD program include:
To read this article in full or to leave a comment, please click here
      

http://www.macworld.com/article/2014022/three-common-strategies-to-support-byod.html
   
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: