What'll you do if they bring their own?
February 11, 2013
Whether you approve of outside devices or not, they are in your company. Pretty few places have no smartphone users checking their mail. Many want to tie into company mail systems. That's just the beginning of the Bring Your Own Device (BYOD) surge. It's said that PCs are pretty much considered dead tech, although that seems severe considering how many laptops you'll see. But the tablets and phones have already assumed their place, even alongside HP 3000s. What happens next is up to you.
HP pushed this message out last week in a small business newsletter article. Management of the BYOD's is their aim, a sound one for a company that's looking for business management opportunities.
Adopting a BYOD strategy can also lower your initial capital expenditures. To manage and secure a wide array of personally owned and hard-to-track devices, your IT team needs to implement clear policies, procedures and safeguards to protect applications and sensitive business data against malware, device loss and failure.
A Wednesday Webinar this week from MB Foster gives the 3000 community, migrated or homesteading, a chance to ask questions and see strategies localized for managers of these systems.
It is not a question of if, but when companies will embrace BYOD with confidence.
In this webinar we will outline and guide you through some of the key considerations related to the implementation of BYOD polices; including
Virtualization: Provide remote access to computing resources.
Walled garden: Contain data within a secure application so that it is segregated from personal data. Allow secure access to email, applications, and data from outside the corporation.
Limited separation: Policies to ensure minimum security controls.