BYOD Programs: A 10-Point Checklist for a Successful Strategy

By Chris Preimesberger  |  Posted 2013-11-25 Email Print this article Print

You're in charge of rolling out a bring-your-own-device (BYOD) program for your company, and you have to figure out what actions to take. BYOD is an approach that allows employees, business partners and others to use personally selected and purchased client devices to execute enterprise applications and access data. It typically spans smartphones and tablets, but the strategy may also be used for PCs, including netbooks, notebooks or other portable connected devices. "BYOD strategies are the most radical change to the economics and the culture of client computing in business in decades," said David Willis, vice president and distinguished analyst at Gartner. "The benefits of BYOD include creating new mobile workforce opportunities, increasing employee satisfaction, and reducing or avoiding costs." This eWEEK slide show, with key information from Ali Din of cloud services provider dinCloud, presents a checklist to make sure your BYOD program works within the requirements of the enterprise.

  • BYOD Programs: A 10-Point Checklist for a Successful Strategy

    by Chris Preimesberger
    1 - BYOD Programs: A 10-Point Checklist for a Successful Strategy
  • Establish the Objective

    Why are you rolling out a formal BYOD program? Is it to save costs? Is it a recruiting perk? By setting the objective, you'll be able to set the parameters and guidelines to run the program more effectively.
    2 - Establish the Objective
  • Get a Baseline

    Figure out what your baseline environment looks like. You can use tools such as Microsoft's System Center or ones from LANDesk as software you install, or you can use cloud-based services such as Microsoft In-Tune. These will monitor the network, giving you an inventory of what is connected to it.
    3 - Get a Baseline
  • Define the Allowed Devices

    Based on the objectives and input from key stakeholders, including management and potential exceptions, create a definition around which devices are allowed. Is it a true BYOD, or is it more of a CYOD (choose your own device)? This means that employees can bring in devices as long as they are on the approved list.
    4 - Define the Allowed Devices
  • Secure Apps and Data

    If there are certain apps that are used by the business, or types of data you want to ensure is secure, you'll want to evaluate whether the allowed devices allow you to manage and control the apps and data. The more important this is, the stricter your requirements might be.
    5 - Secure Apps and Data
  • Enforcing the Policy

    The easy part is rolling out the policy; enforcing it is another matter. This will take time from the IT organization or whoever is tasked with managing this program, and it will also require some tools. While monitoring tools for devices are important, enforcement tools such as mobile device management (MDM) software become critical if security and compliance are top concerns. An MDM tool can set policies on when a device can connect to the network and can manage what apps are available to employees. MDM software also lets you revoke software or other data from a device in case of loss.
    6 - Enforcing the Policy
  • Set Parameters

    Once you have established the devices, apps and data, set parameters. Some of these are tolerance levels if you are using MDM software. Other parameters might be for exceptions, as you may have a population of users that may be eligible for exceptions to the rules. The clearer your objectives are, the easier this is to manage. The more important security is, the less flexible your exception process will be.
    7 - Set Parameters
  • Employee Training

    Don't take for granted that employees don't need training because they are using their own device. While the understanding is that employees in a BYOD program are responsible for supporting their own devices, still have a training plan to roll out the program. This should include letting employees know what devices are permitted and why the program is being rolled out, as well as best practices on keeping company data secure. As new employees join, there should be ongoing training available so the message stays consistent and doesn't turn into word-of-mouth.
    8 - Employee Training
  • Test Before Rolling It Out

    As you roll out the policy, do it in a pilot program. Test it with people who are likely to push the bounds of the device policy. Test it with management and also with employees who are more likely to give feedback. This helps you refine or catch any oversights before the entire company is given a new policy. Change is always difficult, and it is better to go in prepared and knowing what types of feedback are going to come your way.
    9 - Test Before Rolling It Out
  • More Complex Than One Might Think

    Rolling out a BYOD program is a lot more complex than just letting employees bring whatever they want and not addressing the matter. However, it does show more responsibility in keeping the company network resilient and company data secure. There are tools available to help with monitoring and managing devices.
    10 - More Complex Than One Might Think
  • Use Shortcuts as Needed

    You can also find some shortcuts such as utilizing hosted virtual desktops, which are available in a turnkey manner through cloud providers. A virtual desktop can run on virtually any laptop, desktop or tablet and can give employees access to company applications and data in a secure environment even as employees hop from one device to another.
    11 - Use Shortcuts as Needed

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel