Four keys to successful BYOD

By Eric Vanderburg, CISSP, and director of Information Systems and Security at consultancy JurInnov, Network World |  Consumerization of IT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point?

Companies looking to embrace BYOD -- 44% of firms surveyed by Citrix say they have a BYOD policy in place and 94% plan to implement BYOD by 2013 -- need to address four key areas: 1) standardization of service, not device, 2) common delivery methods, 3) intelligent access controls and 4) data containment.

REPORT: Chief mobile officer: A job title now timely?

1. Standardization of service

Standardization is necessary to implement a consistent set of security controls across different platforms while providing the same level of service. Lack of compatibility with security controls can deny legitimate users access to information services and hurt productivity. Solving this issue by adding more access methods can result in weaker security and make the environment more difficult to manage. Instead, companies can give users the service they expect through desktop and application virtualization technologies and terminal servers.

Virtual desktops are hosted on a remote server and emulate a desktop computer to provide access to IT services, including applications and tools users need to do their job. As long as they can connect to the server, users can access their virtual desktop.

Originally published on Network World |  Click here to read the original story.
Join us:






Consumerization of ITWhite Papers & Webcasts

See more White Papers | Webcasts

Ask a Question