In the end, BYOD can create significant savings in equipment and support costs and it can improve employee satisfaction through the use of preferred devices, but it comes with security considerations that should not be taken lightly. If you are considering BYOD, the use of technologies such as virtual desktops and thin computing can effectively provide access and a consistent user experience to users on a variety of platforms.
Furthermore, common delivery methods such as Web-based applications and SSL technologies can make the organization's key applications accessible to business and personal equipment alike. These, coupled with more intelligent access controls, can help companies stay compliant and secure when data is increasingly available while data containment strategies reduce the risk of data loss. Now, when the BYOD policy crosses your desk you will know that the challenge is not insurmountable.
JurInnov is a provider of security, legal and forensic consulting services. The author holds over 25 certifications and is completing a doctorate in information assurance.
Sign up for MIS Asia eNewsletters.