5 best practices for supporting BYOD devices
During 2014, sales of tablets will grow by 18%, and smart phones by 12%, estimates IDC. The analyst firm says BYOD initiatives are driving a lot of the ‘consumerisation’ of IT, with the growing range of smart phones, laptops, tablets and hybrid portable devices being an indication of this.
BYOD can offer significant benefits to employees and the enterprise that, if managed well, can far outweigh the risks. Here are some best practices on supporting employee-owned devices.
1. Identify and engage stakeholders
Consider creating a master vision for your programme by engaging and collaborating with all key stakeholders early in the process-from human resources and legal to IT, corporate services and end users.
Define all the components of your BYOD programme: which new devices you will support; which applications are needed to improve productivity; and the parameters of device ownership.
2. Develop a security model
Have a broader vision for security, rather than just focusing on securing hardware devices. Think about protecting the corporate data that will be accessed by a range of devices.
Determine levels of access, security controls such as authentication, data protection, anti-malware and governance. Consider user training.
3. Decide on your OS and devices
Before you start, consider determining which operating systems the organisation can support, then move to specific devices.
This step isn’t about granting end users their every wish; it’s about your organisation taking an investment in a manageable set of options that can satisfy end users and work for IT.
4. Enable the technology. Plan deployment
Think about how to build out the infrastructure that will work best for your organisation to support the range of devices.
This includes considerations around software requirement, bandwidth options, management needs and investment parameters.
Consider using mobile device management solutions to mitigate security risks. These allow you to set device security policies such as password complexity and length, and settings for lockout, timeout and remote wipe.
5. Stay up-to-date with changing technology
It’s helpful to stay one step ahead of technology trends, so that you can better forecast what’s coming next. One way to do this is by creating a turnkey evaluation process to assess new technologies and devices, so you can efficiently identify those you want to add to your programme.
Intel found success with an assessment process that focused on five components: security, manageability, productivity, performance and ease of use.
By keeping these five best-practice points in mind, you can make BYOD a success in your organisation.
To keep up to date with future articles published on the Intel IT Center, along with exclusive access to in-depth guidance, expert insights and a wealth of learning resources on the hottest topics in IT, register here.
As many of the more data-intensive mobile applications migrate over from smartphones to tablets, the lessons learned from of the first wave of BYOD deployments must not be forgotten.
Securing new Android BYOD mobiles is high on the list for many IT departments. Encryption, MDM, hardware-assisted security and secure containers can all be of assistance.
the arrival of Bring Your Own Device (BYOD) programmes in the enterprise means that the relationship between users and providers of technology is becoming more problematic again
The total cost of ownership of one Ultrabook™ 2 in 1 with Intel® Core™ vPro™ processor is lower than having both laptops and tablets for each employee.
Mobile Computing Trends – What factors motivate worker behavior?
Intel technologies help you block stealthy malware, provide safer authentication, and secure your data