|By Hovhannes Avoyan||
|October 4, 2012 11:23 AM EDT||
As IT becomes more and more personal with the re-invention of smartphones and tablet computers, device management increasingly becomes an issue in organizations. We have covered some important aspects of BYOD policy in our blog, discussing pros and cons of BYOD and today we want to share with you a list of tips from various sources.
Tip #1 – Face the Inevitability of BYOD – and Prepare for It
“70% of small businesses recently surveyed said that BYOD was inevitability at their firms, because so many employees were demanding it…”
Tip #2 – Determine if BYOD is Appropriate for Your Business
“Employees want to choose the same type of device they’ve always used. The way to give the greatest choice is through a BYOD program. This can be good for industries that are very competitive for the brightest employees, such as law firms. It’s an extra perk.
Also, companies with employees that need a phone maybe 20 percent of the time, not really key to their jobs, it may make sense to let them bring their own device and give them a $20 or $30 stipend.
But if a phone is mission critical with all the apps and data, I don’t know how you can turn that into a BYOD device. The legal system hasn’t decided who owns the data on an individual-liable device, even corporate data. It hasn’t ruled consistently on this yet.”
Tip #3 – Make Sure Operating Systems are Compatible
“One of the advantages to owning your own technology infrastructure is the assurance that all of the machines within the enterprise will talk to each other and behave in predictable ways. By allowing employees to bring their own devices, you introduce an element of randomness. Beyond the well-known Apple versus PC argument, there are also many operating systems out there in the land of smartphones: iOS, Android, Windows, Blackberry, Ubuntu Linux, and more. Will they be able to work with your own devices and the devices of their fellow employees?”
Tip #4 – Keep an Eye on Security
“Security and policy are important first steps in a BYOD environment. Thirty-nine percent of companies have experienced a security breach due to employees using unauthorized devices, according to a recent survey by British Telecom of 2,000 enterprises in 11 countries.”
“CIOs have been dealing with mobile device security for a decade. First, there were BlackBerry devices. Then more smartphones emerged, followed by netbooks, and now Apple Inc. has made the tablet famous with the iPad and iPad 2. Now that their form and functionality have been adopted by the consumer outside of the IT shop, CIOs must address not only how devices fit inside their IT shops, but also how their users are connecting to (and putting at risk) the network with their own personal devices.”
Tip #5 – Have a Passcode Rule
“One of the biggest risks to small business owners that let employees use their own mobile devices is if that device will get lost or stolen with sensitive business data or customer information on it. In addition to enforcing a strong passcode rule, small businesses need to make sure the devices have encryption installed.”
Tip #6 – Have a Plan for Emails and Documents
“Email and documents remain two grays areas of which you need to be aware… pay special attention to what happens to your email since email messages stored on mobile devices can contain sensitive data that can be compromised if the device is lost or stolen.”
Tip #7 – Plan Ahead on How to Recover Data
“You may be at risk when you walk around with corporate information on your device. If your device is lost or stolen, what liability do you assume? If you quit your job or get fired, what policies and procedures does your employer have in place to recover their data while removing any potential liability from yourself?”
Tip #8 – Establish Boundaries between Work and Home
“Some of those benefits [of BYOD] include improved productivity and work-life balance among employees as well as significant cost savings. At the same time, BYOD presents agencies with a myriad of security, policy, technical and legal challenges, the working group found.”
“… while improved work-life balance has been touted as a benefit of telework and BYOD, it can produce potentially negative results as well, particularly as employees may have a difficult time establishing work-life boundaries”
Tip # 9 – Make Sure You Have a BYOD Policy in Place
“The details of any BYOD policy will be specific to a given organization, but most policies cover the same basic questions: How should users protect their devices? What data and applications can and can’t be accessed? And what happens when a user loses a device or leaves the company?”
Tip # 10 – Explore the Idea of Creating Internal Apps
“While this [BYOD] has provided IT departments with a host of new security challenges, companies are now finding ways to work with the flow by creating and releasing proprietary, internal apps for smartphones and tablets; some even using their own app stores to do so. A recent survey of IT pros at 6,275 organizations found 66 percent were considering developing a corporate app store.”
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Jul. 24, 2016 02:00 PM EDT Reads: 1,183
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Jul. 24, 2016 01:30 PM EDT Reads: 774
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
Jul. 24, 2016 12:00 PM EDT Reads: 1,856
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Jul. 24, 2016 12:00 PM EDT Reads: 1,874
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformative effort is likely to also have a modernizing effect, and thus, we can see these as levels of improvement efforts. However, many businesses are being led to believe if they don’t transform now they risk becoming ...
Jul. 24, 2016 11:00 AM EDT Reads: 1,098
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Jul. 24, 2016 11:00 AM EDT Reads: 1,788
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Jul. 24, 2016 11:00 AM EDT Reads: 2,016
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Jul. 24, 2016 11:00 AM EDT Reads: 1,297
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 24, 2016 09:30 AM EDT Reads: 1,068
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Jul. 24, 2016 08:45 AM EDT Reads: 898
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Jul. 24, 2016 08:30 AM EDT Reads: 1,470
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Jul. 24, 2016 08:30 AM EDT Reads: 2,064
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 24, 2016 08:15 AM EDT Reads: 1,819
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Jul. 24, 2016 08:15 AM EDT Reads: 1,059
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 24, 2016 08:15 AM EDT Reads: 1,184
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Jul. 24, 2016 08:00 AM EDT Reads: 905
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Jul. 24, 2016 07:45 AM EDT Reads: 766
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Jul. 24, 2016 07:00 AM EDT Reads: 1,421
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Jul. 24, 2016 05:30 AM EDT Reads: 1,320
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jul. 24, 2016 04:45 AM EDT Reads: 1,895