Three BYOD approaches -- and the budget impact

By Ennio Carboni, president of Ipswitch's Network Management Division, Network World |  Consumerization of IT, BYOD

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

Love it or hate it, BYOD is likely already affecting security, network performance and your budget (it can drive up costs by more than a third, according to some researchers). Here are three approaches to address these challenges.

ANALYSIS: How BYOD has changed the IT landscape

* The Frugal Approach: Some IT departments are "securing" their network by isolating all tablets and smartphone devices to a separate VLAN, outside the corporate network, where the only way to access internal resources is via VPN. There are no specific mobile management capabilities, so IT utilizes existing network management solutions to monitor network traffic inside and outside the VLAN to detect suspicious activity and ensure new demands on network bandwidth are being met. Does it work? Yes, for some organizations.

Is it optimal? No. You still lack visibility to discover who are the top bandwidth consumers and track these trends in the long term. Will it fit your existing IT budget? Yes, since you are probably repurposing the tools that you already have in place. 

* The Big Brother Approach: Some IT departments are willing to spend on dedicated mobile management capabilities. Costs add up quickly as more devices are introduced to the network. There are several approaches here as well -- at various costs -- but this approach is best for larger organizations or public companies that must met compliance regulations. For example, you can focus on the mobile endpoints and force end users to use a password. Another area to explore is encryption of any sensitive data, such as corporate email. You can select a SaaS solution that creates a so-called "dual-persona" environment where some apps and data are cordoned off for enterprise use, others for personal use.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Consumerization of ITWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question