Python Authors: Pat Romanski, AppDynamics Blog, Donald Meyer, Liz McMillan, Elizabeth White

Blog Feed Post

10 Tips for Implementing BYOD

As IT becomes more and more personal with the re-invention of smartphones and tablet computers, device management increasingly becomes an issue in organizations. We have covered some important aspects of BYOD policy in our blog, discussing pros and cons of BYOD and today we want to share with you a list of tips from various sources.

Tip #1 – Face the Inevitability of BYOD – and Prepare for It

“70% of small businesses recently surveyed said that BYOD was inevitability at their firms, because so many employees were demanding it…”

Four BYOD Challenges Small Businesses Face



Tip #2 – Determine if BYOD is Appropriate for Your Business

“Employees want to choose the same type of device they’ve always used. The way to give the greatest choice is through a BYOD program. This can be good for industries that are very competitive for the brightest employees, such as law firms. It’s an extra perk.

Also, companies with employees that need a phone maybe 20 percent of the time, not really key to their jobs, it may make sense to let them bring their own device and give them a $20 or $30 stipend.

But if a phone is mission critical with all the apps and data, I don’t know how you can turn that into a BYOD device. The legal system hasn’t decided who owns the data on an individual-liable device, even corporate data. It hasn’t ruled consistently on this yet.”

BYOD Myths: Cost Savings, Productivity Gains, Less Headaches



Tip #3 – Make Sure Operating Systems are Compatible

“One of the advantages to owning your own technology infrastructure is the assurance that all of the machines within the enterprise will talk to each other and behave in predictable ways. By allowing employees to bring their own devices, you introduce an element of randomness. Beyond the well-known Apple versus PC argument, there are also many operating systems out there in the land of smartphones: iOS, Android, Windows, Blackberry, Ubuntu Linux, and more. Will they be able to work with your own devices and the devices of their fellow employees?”

Small business owners, beware of BYOD

Tip #4 – Keep an Eye on Security

“Security and policy are important first steps in a BYOD environment. Thirty-nine percent of companies have experienced a security breach due to employees using unauthorized devices, according to a recent survey by British Telecom of 2,000 enterprises in 11 countries.”

BYOD policy: More than on-boarding and security

“CIOs have been dealing with mobile device security for a decade. First, there were BlackBerry devices. Then more smartphones emerged, followed by netbooks, and now Apple Inc. has made the tablet famous with the iPad and iPad 2. Now that their form and functionality have been adopted by the consumer outside of the IT shop, CIOs must address not only how devices fit inside their IT shops, but also how their users are connecting to (and putting at risk) the network with their own personal devices.”

Mobile device security and risks: What you need to know

Tip #5 – Have a Passcode Rule

“One of the biggest risks to small business owners that let employees use their own mobile devices is if that device will get lost or stolen with sensitive business data or customer information on it. In addition to enforcing a strong passcode rule, small businesses need to make sure the devices have encryption installed.”

How to Let Employees BYOD Without the Risk

Tip #6 – Have a Plan for Emails and Documents

“Email and documents remain two grays areas of which you need to be aware… pay special attention to what happens to your email since email messages stored on mobile devices can contain sensitive data that can be compromised if the device is lost or stolen.”

Tips For Making Sure “Bring Your Own Device” Doesn’t Blow Up In Your Face



Tip #7 – Plan Ahead on How to Recover Data

“You may be at risk when you walk around with corporate information on your device. If your device is lost or stolen, what liability do you assume? If you quit your job or get fired, what policies and procedures does your employer have in place to recover their data while removing any potential liability from yourself?”

Making Sure BYOD Doesn’t Mean “Bring Your Own Disaster”

Tip #8 – Establish Boundaries between Work and Home

“Some of those benefits [of BYOD] include improved productivity and work-life balance among employees as well as significant cost savings. At the same time, BYOD presents agencies with a myriad of security, policy, technical and legal challenges, the working group found.”

“… while improved work-life balance has been touted as a benefit of telework and BYOD, it can produce potentially negative results as well, particularly as employees may have a difficult time establishing work-life boundaries”

‘Bring Your Own Device’ for Beginners

Tip # 9 – Make Sure You Have a BYOD Policy in Place

“The details of any BYOD policy will be specific to a given organization, but most policies cover the same basic questions: How should users protect their devices? What data and applications can and can’t be accessed? And what happens when a user loses a device or leaves the company?”

How to create a BYOD policy

Tip # 10 – Explore the Idea of Creating Internal Apps

“While this [BYOD] has provided IT departments with a host of new security challenges, companies are now finding ways to work with the flow by creating and releasing proprietary, internal apps for smartphones and tablets; some even using their own app stores to do so. A recent survey of IT pros at 6,275 organizations found 66 percent were considering developing a corporate app store.”

Why businesses are creating their own internal app stores

Share Now:del.icio.usDiggFacebookLinkedInBlinkListDZoneGoogle BookmarksRedditStumbleUponTwitterRSS

Read the original blog entry...

More Stories By Hovhannes Avoyan

Hovhannes Avoyan is the CEO of PicsArt, Inc.,

@ThingsExpo Stories
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
“Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. CloudBerry Backup is a leading cross-platform cloud backup and disaster recovery solution integrated with major public cloud services, such as Amazon Web Services, Microsoft Azure and Google Cloud Platform.
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In the next forty months – just over three years – businesses will undergo extraordinary changes. The exponential growth of digitization and machine learning will see a step function change in how businesses create value, satisfy customers, and outperform their competition. In the next forty months companies will take the actions that will see them get to the next level of the game called Capitalism. Or they won’t – game over. The winners of today and tomorrow think differently, follow different...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.