5 best practices for supporting BYOD devices - Intel IT Center Connect
BYOD
Topics:BYODCloudData Center ServicesMobility
How to BYOD

5 best practices for supporting BYOD devices

Arif Mohamed | Computerworld UK | 11th July 2014

During 2014, sales of tablets will grow by 18%, and smart phones by 12%, estimates IDC. The analyst firm says BYOD initiatives are driving a lot of the ‘consumerisation’ of IT, with the growing range of smart phones, laptops, tablets and hybrid portable devices being an indication of this.

BYOD can offer significant benefits to employees and the enterprise that, if managed well, can far outweigh the risks. Here are some best practices on supporting employee-owned devices.

1. Identify and engage stakeholders
Consider creating a master vision for your programme by engaging and collaborating with all key stakeholders early in the process-from human resources and legal to IT, corporate services and end users.

Define all the components of your BYOD programme: which new devices you will support; which applications are needed to improve productivity; and the parameters of device ownership.

2. Develop a security model
Have a broader vision for security, rather than just focusing on securing hardware devices. Think about protecting the corporate data that will be accessed by a range of devices.

Determine levels of access, security controls such as authentication, data protection, anti-malware and governance. Consider user training.

3. Decide on your OS and devices
Before you start, consider determining which operating systems the organisation can support, then move to specific devices.

This step isn’t about granting end users their every wish; it’s about your organisation taking an investment in a manageable set of options that can satisfy end users and work for IT.

4. Enable the technology. Plan deployment
Think about how to build out the infrastructure that will work best for your organisation to support the range of devices.

This includes considerations around software requirement, bandwidth options, management needs and investment parameters.

Consider using mobile device management solutions to mitigate security risks. These allow you to set device security policies such as password complexity and length, and settings for lockout, timeout and remote wipe.

5. Stay up-to-date with changing technology
It’s helpful to stay one step ahead of technology trends, so that you can better forecast what’s coming next. One way to do this is by creating a turnkey evaluation process to assess new technologies and devices, so you can efficiently identify those you want to add to your programme.

Intel found success with an assessment process that focused on five components: security, manageability, productivity, performance and ease of use.

By keeping these five best-practice points in mind, you can make BYOD a success in your organisation.

To keep up to date with future articles published on the Intel IT Center, along with exclusive access to in-depth guidance, expert insights and a wealth of learning resources on the hottest topics in IT, register here.

Mobile communication mobile phone

Lessons from the first wave of BYOD adoption

As many of the more data-intensive mobile applications migrate over from smartphones to tablets, the lessons learned from of the first wave of BYOD deployments must not be forgotten.