Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Four keys to successful BYOD

Eric Vanderburg, CISSP, and director of Information Systems and Security at consultancy JurInnov | Feb. 15, 2012
The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point?

In the end, BYOD can create significant savings in equipment and support costs and it can improve employee satisfaction through the use of preferred devices, but it comes with security considerations that should not be taken lightly. If you are considering BYOD, the use of technologies such as virtual desktops and thin computing can effectively provide access and a consistent user experience to users on a variety of platforms.

Furthermore, common delivery methods such as Web-based applications and SSL technologies can make the organization's key applications accessible to business and personal equipment alike. These, coupled with more intelligent access controls, can help companies stay compliant and secure when data is increasingly available while data containment strategies reduce the risk of data loss. Now, when the BYOD policy crosses your desk you will know that the challenge is not insurmountable.

JurInnov is a provider of security, legal and forensic consulting services. The author holds over 25 certifications and is completing a doctorate in information assurance.


Previous Page  1  2  3  4 

Sign up for MIS Asia eNewsletters.