Software Love, Marriage and Breakups
Our Chain of Succession, and Yours

What'll you do if they bring their own?

SmartphoneWhether you approve of outside devices or not, they are in your company. Pretty few places have no smartphone users checking their mail. Many want to tie into company mail systems. That's just the beginning of the Bring Your Own Device (BYOD) surge. It's said that PCs are pretty much considered dead tech, although that seems severe considering how many laptops you'll see. But the tablets and phones have already assumed their place, even alongside HP 3000s. What happens next is up to you.

HP pushed this message out last week in a small business newsletter article. Management of the BYOD's is their aim, a sound one for a company that's looking for business management opportunities. 

Adopting a BYOD strategy can also lower your initial capital expenditures. To manage and secure a wide array of personally owned and hard-to-track devices, your IT team needs to implement clear policies, procedures and safeguards to protect applications and sensitive business data against malware, device loss and failure.

A Wednesday Webinar this week from MB Foster gives the 3000 community, migrated or homesteading, a chance to ask questions and see strategies localized for managers of these systems.

Birket Foster, CEO, is your host for the Webinar at 2 PM on the 13th. You can register online. (It's a pretty nifty system that lets them call your number when you're ready to take the call. Pops up with a spiffy web app that includes a chat option as well as a way to see the slides while you listen to Birket speak.)

It is not a question of if, but when companies will embrace BYOD with confidence.

In this webinar we will outline and guide you through some of the key considerations related to the implementation of BYOD polices; including

Virtualization: Provide remote access to computing resources.

Walled garden: Contain data within a secure application so that it is segregated from personal data. Allow secure access to email, applications, and data from outside the corporation.

Limited separation: Policies to ensure minimum security controls.

 

 

 

Comments