Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    BYOD Programs: A 10-Point Checklist for a Successful Strategy

    By
    Chris Preimesberger
    -
    November 25, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1BYOD Programs: A 10-Point Checklist for a Successful Strategy

      1 - BYOD Programs: A 10-Point Checklist for a Successful Strategy

      by Chris Preimesberger

      2Establish the Objective

      2 - Establish the Objective

      Why are you rolling out a formal BYOD program? Is it to save costs? Is it a recruiting perk? By setting the objective, you’ll be able to set the parameters and guidelines to run the program more effectively.

      3Get a Baseline

      3 - Get a Baseline

      Figure out what your baseline environment looks like. You can use tools such as Microsoft’s System Center or ones from LANDesk as software you install, or you can use cloud-based services such as Microsoft In-Tune. These will monitor the network, giving you an inventory of what is connected to it.

      4Define the Allowed Devices

      4 - Define the Allowed Devices

      Based on the objectives and input from key stakeholders, including management and potential exceptions, create a definition around which devices are allowed. Is it a true BYOD, or is it more of a CYOD (choose your own device)? This means that employees can bring in devices as long as they are on the approved list.

      5Secure Apps and Data

      5 - Secure Apps and Data

      If there are certain apps that are used by the business, or types of data you want to ensure is secure, you’ll want to evaluate whether the allowed devices allow you to manage and control the apps and data. The more important this is, the stricter your requirements might be.

      6Enforcing the Policy

      6 - Enforcing the Policy

      The easy part is rolling out the policy; enforcing it is another matter. This will take time from the IT organization or whoever is tasked with managing this program, and it will also require some tools. While monitoring tools for devices are important, enforcement tools such as mobile device management (MDM) software become critical if security and compliance are top concerns. An MDM tool can set policies on when a device can connect to the network and can manage what apps are available to employees. MDM software also lets you revoke software or other data from a device in case of loss.

      7Set Parameters

      7 - Set Parameters

      Once you have established the devices, apps and data, set parameters. Some of these are tolerance levels if you are using MDM software. Other parameters might be for exceptions, as you may have a population of users that may be eligible for exceptions to the rules. The clearer your objectives are, the easier this is to manage. The more important security is, the less flexible your exception process will be.

      8Employee Training

      8 - Employee Training

      Don’t take for granted that employees don’t need training because they are using their own device. While the understanding is that employees in a BYOD program are responsible for supporting their own devices, still have a training plan to roll out the program. This should include letting employees know what devices are permitted and why the program is being rolled out, as well as best practices on keeping company data secure. As new employees join, there should be ongoing training available so the message stays consistent and doesn’t turn into word-of-mouth.

      9Test Before Rolling It Out

      9 - Test Before Rolling It Out

      As you roll out the policy, do it in a pilot program. Test it with people who are likely to push the bounds of the device policy. Test it with management and also with employees who are more likely to give feedback. This helps you refine or catch any oversights before the entire company is given a new policy. Change is always difficult, and it is better to go in prepared and knowing what types of feedback are going to come your way.

      10More Complex Than One Might Think

      10 - More Complex Than One Might Think

      Rolling out a BYOD program is a lot more complex than just letting employees bring whatever they want and not addressing the matter. However, it does show more responsibility in keeping the company network resilient and company data secure. There are tools available to help with monitoring and managing devices.

      11Use Shortcuts as Needed

      11 - Use Shortcuts as Needed

      You can also find some shortcuts such as utilizing hosted virtual desktops, which are available in a turnkey manner through cloud providers. A virtual desktop can run on virtually any laptop, desktop or tablet and can give employees access to company applications and data in a secure environment even as employees hop from one device to another.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.