Bring Your Own Device (BYOD) for Enterprise
In the U.S. 40% of employees in large enterprises use their personal devices for work and that number is expected to increase threefold by 2020.
While the age of enterprise mobility is well and truly upon us, the concept of ‘Bring your own device” or BYOD is just beginning. BYOD is the scenario where an organisation enables its employees, and contractors etc.to use their own devices to connect to the enterprise. Traditionally a company issues devices that are provisioned and maintained internally by the IT department. BYOD can substantially benefit the organisation, but if not managed properly could be detrimental to your business.
Bring Your Own Device scenarios can increase productivity while lowering the barriers to enterprise mobility adoption. Using a device familiar to the user improves the user experience as takes away stress related to the change in work practice. Another huge factor is Improved workplace flexibility, and this leads to increased loyalty, high morale and employee engagement. BYOD also extends the reach, connectivity and collaboration of the organisation beyond its employees to contractors for example that depend heavily on certain information and systems to do their job safely and more efficiently. Without which many external stakeholders simply have no access to the systems and data they need. A world of paper-based processes and forms emerge where back office dependencies morph to unacceptable proportions.
Besides alleviating this, adopting a BYOD principle also has the potential to reduce hardware costs and reliance on support resources to the tune around $4200 AUD/year/device to be exact
However, BYOD can also introduce new risks to an organisation's business and the security of its information which need to be carefully considered and managed before implementation and wider addoption. Lets take a look at some of the key BYOD considerations and risk minimisation strategies for Chief Information Officers and other senior decision-makers.
The main risk considerations in enterprise mobility, including BYOD, can be summarised in the five 'P's of enterprise mobility – purpose, planning, policy, polish and platform.
There are some significant gains to made adopting BYOD, including significant reduction in expensive technical resource required to manage and provision devices, Significant hardware cost reductions and improved user experience. Organisations should use a risk management process to balance the benefits of BYOD with associated business and security risks.
In particular, seek answers to the following questions:
Risk Management of Enterprise Mobility including Bring Your Own Device (BYOD) Austraian Government –
The Mobile-Enabled Enterprise: Are We There Yet? Computer World
Calculating the true cost of BYOD - Forbes
According to Gartner, this year over half of all enterprise employers will require employees to supply their own device for work purposes (BYOD). But BYOD will increase risks and security is the top concern for BYOD.
Infrastructure dependent ……….
Traditionally companies use corporate perimeters bounded by firewalls to secure their environment. With the consumerisation of IT, those borders don’t exist anymore. Apps have to be accessible to anyone at any time using any device. This means where there used to be a defined security perimeter, the border is now defined by the identity and access management process itself.
The move to the cloud is unstoppable, companies are looking to move faster than ever. The issue is that many large corporates and government entities aren’t using a single public cloud instance, often relying on a mix of on-premise, public cloud, hybrid cloud and private cloud scenarios. Companies like Microsoft with its Azure platform, and Amazon, with its AWS platform, are doing a good job with basic identity and access management but the fact is that that although they can control access to their applications, they can’t always control access to the applications a company may have hosted in, or connected to, the cloud.
If you have an on -premise ERP application, for example, a cloud ID service may not provide identity and access management for that application, while third party applications can. For the most part this is costly and only the large organisations, who can afford their own cloud infrastructure are able to adjust.
TOKN supports back-end integration, app management and app build toenable effective manage data transfer.
Effective Data Management
CIOs have less control over mobile devices used in their organisation, which ultimately means they are more vulnerable to attacks. Using their own devices employees are downloading mobile apps and connecting to external Wi-Fi spots without always having the correct security protocols in place. According to a study conducted by HP, 97% of employee’s devices contained privacy issues, and 75% lacked adequate data encryption. This creates serious security concerns that can be exploited by hackers. This, coupled with the fact that your employees might not have anti-virus protection or have an up to date firewall present on their mobile devices, means they are more vulnerable to attacks.
To prevent viruses spreading it is important that there is a gatekeeper. TOKN’s Connect service performs this function by verifying that the data being transferred from the mobile device to your IT network is encrypted and permitted.
Separate work from play
One of the most obvious BYOD security challenges is coping with the storage of work and personal data on the same device. Ultimately there are going to be certain types of corporate data that will be transferred to the organisation and stored locally on the device, so consideration needs to be given to the topic of securing this data.
One of the biggest threats to mobile devices is malware that is installed unknowingly by the user, meaning malware could find its way onto the network.
TOKN's secure client provides a secure delineation between work and play on the device
The biggest risk in this area that IT departments fear is when employee’s devices are lost or stolen, or even who has what device and what app……According to an article in IT business edge, over half of security breaches occur when devices are stolen, it is therefore vital that companies are implementing encryption tactics to ensure that the device is secure against threats. A simple but effective way to ensure that employees secure their device is by prompting them to use even basic security protocols like using a device pin code.
Furthermore Employees who don’t keep their devices up to date are at further risk of being targeted by hackers. This includes mobile operating systems as well as install the apps
TOKN device control service includes the enforcement of IT security protocols like pin codes, and remote wiping capabilities so that IT Managers have the power to wipe the device as soon as possible without having to ask for the user’s permission.
Contact us to hear more about TOKN’s Digital Enterprise Mobility products and services
As Malcom Turnbull declares doubts about the commercially viability of the NBN, many others claim high speed mobile networks to be the answer. And while many call for protection from high speed mobile networks bringing massive downloads speeds, others profess the consistency of fixed line to deliver a superior service over mobile while highlighting the potential health affects of 5G.
But where does this leave your business?
To answer this question, we need to look at this more closely, without all the hype, and we need to make a careful distinction between connectivity and functionality.
To understand the impact high speed mobile networks like 5G may have, all we have to do is look back at 4G. Many of the functions now available on the smart phone would have be unthinkable without 4G speeds and volume. Things like Voice Over the Internet VOIP and interactive map reading have all became mainstream. Looking ahead to 5G, the biggest impact is said to be the reduction in latency, from an estimated 60 milliseconds to 1 millisecond. Think of this in the context of IoT, connected devices and machine learning. What if driver-less cars could anticipate a crash, engaging the collision avoidance mechanism 60 times as fast.
So the world is changing and these high speed mobile networks will deliver new functionality, increasing reactions and responsiveness of just about anything.
But will your business be able to leverage the benefit of this enhanced platform?
Lets not forget that Ultra-high reliable communication and improved capacity are some of the major requirements of the 5th generation (5G) mobile and wireless networks. Achieving this means avoiding radio link failures and the service interruptions that occurs during the failures and their re-establishment. 5G millimetre waves can transfer heaps of data at very high speeds, but they don't travel as far as the lower-frequency waves used in 4G networks. High-frequency millimetre waves also have difficulty getting around walls, buildings, and other obstacles. When the 5G networks are built, the carriers will have to use more antennas, way more, to get the same coverage as our current networks.
This means carriers have to upgrade and roll out their massive infrastructures fist……… Secondly 5G brings with it new antennas, new devices, and new applications to fully support categories like driverless cars, virtual reality and connected drones.
So where does this leave you……….
Firstly you may for the foreseeable future need to deal with patchy network coverage. Finding a mobility solution that supports uninterrupted working is still a must for most businesses especially those operating in remote regions. This will ensure a smooth transition between areas of coverage and no coverage and will keep your workforce productive during outages. This is easier said than done. An app alone cannot deliver uninterrupted work, and an app alone is not future proof.
Native application build will get you someway there in terms of the app working offline, but for it to be meaningful to your business, its data that you need when you need it, and finding a solution that can manage that is not always straight forward. Secondly whatever solution you invest in needs to be future proof. Having the capability to quickly build and change new applications that will run on new devices, device firmware, operating system versions is a must. By controlling these aspects of mobility, your business will not only have access to the enterprise data it needs when required, but also the flexibility to keep those apps future proof.
Clinton Schroeder October 2017 TOKN