5 best practices for supporting BYOD devices - Intel IT Center Connect
Topics:BYODCloudData Center ServicesMobility
How to BYOD

5 best practices for supporting BYOD devices

Arif Mohamed | Computerworld UK | 11th July 2014

During 2014, sales of tablets will grow by 18%, and smart phones by 12%, estimates IDC. The analyst firm says BYOD initiatives are driving a lot of the ‘consumerisation’ of IT, with the growing range of smart phones, laptops, tablets and hybrid portable devices being an indication of this.

BYOD can offer significant benefits to employees and the enterprise that, if managed well, can far outweigh the risks. Here are some best practices on supporting employee-owned devices.

1. Identify and engage stakeholders
Consider creating a master vision for your programme by engaging and collaborating with all key stakeholders early in the process-from human resources and legal to IT, corporate services and end users.

Define all the components of your BYOD programme: which new devices you will support; which applications are needed to improve productivity; and the parameters of device ownership.

2. Develop a security model
Have a broader vision for security, rather than just focusing on securing hardware devices. Think about protecting the corporate data that will be accessed by a range of devices.

Determine levels of access, security controls such as authentication, data protection, anti-malware and governance. Consider user training.

3. Decide on your OS and devices
Before you start, consider determining which operating systems the organisation can support, then move to specific devices.

This step isn’t about granting end users their every wish; it’s about your organisation taking an investment in a manageable set of options that can satisfy end users and work for IT.

4. Enable the technology. Plan deployment
Think about how to build out the infrastructure that will work best for your organisation to support the range of devices.

This includes considerations around software requirement, bandwidth options, management needs and investment parameters.

Consider using mobile device management solutions to mitigate security risks. These allow you to set device security policies such as password complexity and length, and settings for lockout, timeout and remote wipe.

5. Stay up-to-date with changing technology
It’s helpful to stay one step ahead of technology trends, so that you can better forecast what’s coming next. One way to do this is by creating a turnkey evaluation process to assess new technologies and devices, so you can efficiently identify those you want to add to your programme.

Intel found success with an assessment process that focused on five components: security, manageability, productivity, performance and ease of use.

By keeping these five best-practice points in mind, you can make BYOD a success in your organisation.

To keep up to date with future articles published on the Intel IT Center, along with exclusive access to in-depth guidance, expert insights and a wealth of learning resources on the hottest topics in IT, register here.


How to make your BYOD workers secure

BYOD enables workers to be more productive and flexible, giving employees access to resources wherever they are, whenever they need them. But it also brings greater security concerns.

Windows 8 laptop tablet handset

5 ways to transform your workplace in 2015

The New Year brings fresh opportunities to transform your workplace and enable greater mobility, collaboration and efficiencies. Here are five ways to transform your workplace in 2015.