Managing the BYOD Revolution
Related Content
Next Gen Mobile Device Management
Read the full Spring 2012 issue
The “bring your own device” (BYOD) movement that began with smartphones now includes employee-owned tablets. Companies must consider new policies and technologies to keep devices secure and data safe:
Build an Enterprise App Store. Vendors are developing corporate app stores that offer a convenient and secure way to distribute and maintain company-approved custom apps for mobile devices.
Distinguish Personal Data from Corporate Data. As personal and professional uses converge, companies need to consider how to manage devices without inadvertently affecting personal user data. Remote locking and wiping are minimal capabilities firms should deploy to keep corporate data safe.
Protect It, Own It. Can employees be trusted to care for expensive, fragile mobile devices? A corporate policy of giving employees an asset after they’ve used it for two years will encourage them to keep it safe.
Establish an Application Geo-Fence. As devices cross country boundaries, applications need to know where they’re running — so they can determine whether it’s safe to access sensitive data in countries where network traffic may be closely monitored.
Employ Extra Security. RFID chips and biometrics will begin to appear in mobile devices, adding more elements of accountability, tracking and security.
