"BYOD" comes with device information

Source: Internet
Author: User
Tags ming

Brief introduction:

BYOD (bring Your Own device) is a device that carries its own devices, including personal computers, mobile phones, tablets, and more, such as mobile smart devices such as mobile phones or tablets. In airports, hotels, cafes, etc., login to the company mailbox, online Office system, not by time, location, equipment, personnel, network environment restrictions, BYOD to people show a beautiful future office scene.

Install a lot of company software on your own device so that you can use your company's resources. When an employee's device such as an iphone installs such management software, the employee's own phone becomes the company's phone, and the agent keeps synchronizing with the server (without knowing the details of the synced program and data). While this is an employee's "Own device," BYOD has become "become Your Office Device" from "Bring Your Own device".

Bring your own device (BYOD) is a policy that allows employees to bring their own laptops, tablets, smartphones and other mobile devices to the workplace, and can use these devices to obtain information about the company, using the Enterprise Licensing application. The term can also be used to describe the behavior of students using their own smart devices in educational establishments.

The wide use of smart phones, pads, computers and other personal intelligent devices is changing our world, not only enriching people's entertainment life, but also become a good helper for learning and working. Bringing your own device (BYOD) has become a popular trend in the present.

The term "Bring your own Device" (BYOD) first appeared in 2009, when the company found that more and more company employees were bringing their own devices to work and connecting them to the company intranet.

Solution:

Many businesses are beginning to consider allowing employees to bring their own smart devices to use in-house applications. The company's goal is to meet the staff's own new technology and personalized pursuit while improving staff productivity, reduce the cost and investment of the mobile terminal. To support BYOD and achieve enterprise-class data security and stable operation requirements, Mobile IT emerged. In contrast to the traditional PC-centric it platform, Mobile IT is a service center with a mobility terminal, consisting mainly of three partial MDM (mobile device Management), MAM (mobile application Managem ENT mobile app Management) MCM (mobile content Management).

Because the device for a BYOD project belongs to individual employees rather than to the enterprise, it is important to define the scope of IT management in a BYOD project and to differentiate between enterprise data and personal privacy accurately. In the technical aspect, the mobile terminal management software needs to support the enterprise data and the Personal Data Security division, in the management system aspect, the enterprise needs with the employee clearly agreed the responsibility and the obligation of both parties.

Mode features:

The BYOD model is a dramatic result of it consumerization. This model is driven by employees rather than businesses, and employees ' preferences for new technologies in turn drive companies to change and adapt to new technologies. However, these new technologies do not take into account the enterprise's application environment and requirements in the early stages of design and development, so many IT support organizations are very concerned about the security and support risks associated with this.

Evaluation method:

BYOD is not just a matter of simple ownership transfer, it contains very complex, even hidden issues and risks that need to be circumvented and resolved. In terms of specific evaluation operations, the 8-dimensional evaluation methodology defined by the Mobile Terminal Management vendor (MobileIron) is the most widely used:

1. Selection of terminal equipment:

Analyze and investigate employee preferences to learn about the equipment brands and models that have been purchased.

Define the bottom line that companies and employees can accept: What features BYOD should support specifically, what security policies to use, and how to evaluate operating system, hardware, and regional differences based on this bottom line.

Develop and collate a device entry criteria and thresholds to prepare for future evaluation of new terminal devices.

Communicate clearly with employees, which devices are allowed to be used, and which cannot, and explain why.

Ensure that the IT team is fully aware of the latest products, equipment and related information.

2. User experience and Privacy protection:

Confirm what user activity and data The IT team will monitor.

Identify the standard measures and responses that the IT team takes in various situations.

Define the BYOD privacy policy to focus on assessing the sustainability of security and throttling policies.

Deploy core Services (email, critical applications, WLAN) to maintain the original application experience of the end device.

Ensure that the use requirements and regulations are communicated to employees clearly and unambiguously.

3. Trust mode:

Identify and evaluate common security risks for personal device terminals.

Define remediation and corrective action options, such as: Message notification, access control, quarantine, selective wipe.

Set up a ladder-style strategy to establish user and terminal device identity authentication.

Keep a cautious eye on the sustainability of your security policy policy.

4. APP Design and Management:

When designing mobile apps, consider the level of trust that corresponds to a personal terminal device.

Classify the categories of apps and to whom they are valid, based on the ownership of end devices.

In the development of the application process, make sure to invest resources, consider the characteristics of personal terminal equipment.

Update the acceptable apps usage policy.

Defines the level of enforcement when an app violation occurs: Message notification, access control, quarantine, selective wipe.

5. Responsibilities and Obligations:

Identify the basic entry and bottom line for protecting corporate data on personal devices in BYOD mode.

Assess the user's liability for Web Access and app use.

To evaluate the responsibility and obligation of the equipment online and offline, as well as the duty to work hours and off hours.

Assess the impact of reimbursement systems on user liability obligations (e.g. partial reimbursement and full reimbursement).

Evaluate and validate the monitoring, enforcement, and audit costs of implementing BYOD policies.

Assess the risk of an enterprise's access to and corruption of personal user data, such as: Error actions all erase commands instead of selective wipe.

6. Cost Control:

Transfer hardware costs to employees, using a partial reimbursement or subsidy pattern.

The cost of exceeding the scope is controlled by means of liability for use.

Establish appropriate cost and flow plans, and recognize the resulting loss of business negotiation and negotiation capacity.

Evaluate how the employee's own device platform will affect productivity.

Change the helpdesk mode (in BYOD mode Helpdesk from the previous front-line support platform into the last support platform).

If the forensic assessment uses personal device liability at a lower risk, then the cost of auditing and compliance with the rules will be reduced to assess whether the tax issue is affected.

7. Sustainable development:

Effectively protect corporate data.

Reduce execution costs.

Ensure that the user experience is unaffected.

Follow up and update user preferences and technical innovation information at any time.

8. Enterprise Internal Promotion:

Introduce and explain why we use the BYOD model.

It is necessary to understand that the BYOD model is co-sponsored and undertaken by HR and IT departments.

Define and build it roles and support it with appropriate actions.

Security Policy:

Now more is the case for mobile smart devices such as mobile phones or tablets. Many businesses are beginning to consider allowing employees to bring their own smart devices to use in-house applications. The company's goal is to meet the staff's own new technology and personalized pursuit while improving staff productivity, reduce the cost and investment of the mobile terminal. The idea behind this is that users can use personal devices like tablets for both work and private affairs. Imagine a user connecting to a corporate network with his or her own device, which could allow the spread of malicious software across a corporate network. This has led some people to think of BYOD as asking for trouble. As with other areas of the IT industry, you can set some rules to minimize the security risks of BYOD.

Ming Wanda Wang Zhihai pointed out that, compared to the traditional information mode, the BYOD environment has three aspects of security risks: first, through the mobile network link access, natural in an open network, and the traditional important information systems are through the enterprise intranet access; Second, the use of the environment and traditional information model is not the same, Traditional most of the time in a fixed office space, the possibility of device loss is very small, BYOD usually use mobile Smart terminal, more easily lost; third, BYOD uses a personal device that often installs many personal apps at the same time, and there's a plethora of malware in the personal app market, This puts enterprise data in a security breach.

Beijing Ming Wanda Company Independent Research and Development of the CHINASEC (safety) mobile security management system, based on the characteristics of mobile terminal applications developed mobile terminal security management and application of products, for modern mobile terminal applications to provide technical protection means, Solve the security risk problem that the application system with sensitive information extends from the tightly guarded intranet to the open mobile network.
Products from the user identity security, network communications security, application access security, MDM (mobile device Management), MAM (mobile application Management) and MCM (mobile content Management) and other aspects of the security of the various intelligent mobile terminals, while providing log audit, device management, two development interfaces and other functions, To build a complete mobile data security solution for users.

Why use:

Many users now have devices that are ready to use. For example, some users might use a Mac book Pro netbook that loads Linux, an ipad, or a smartphone. BYOD can help companies reduce the expense of IT equipment. Employees can use their own personal devices, so that capacity increases. The growth of BYOD is stimulated by the popularity of tablets and smartphones. These devices are said to represent mainstream personal devices.

Security matters:

There are a number of security-related issues with BYOD. Malware and eavesdropping (in the case of using public WiFi) are two possible risks. The purpose of our post is to understand the preparation steps required to deploy BYOD. Ideally, you can create a policy document about BYOD, and all members should have access to the policy document.

Which devices are supported:

A good point around BYOD is: What type of device can access the corporate network? From this point on, compatible devices are driven to some extent by the needs of the application. As an example of a Windows 7 app, it may not be the same as the ipad, and if it's an important app, users won't be able to use the ipad on the corporate network unless the app is placed on iOS.

Advantages of Use:

Meet employees ' needs and earn their trust. Employees ' need to work flexibly and personalize their equipment has prompted employees to no longer fully differentiate between private and working equipment. In many people's view, the mobile era of work is not just work hours, anytime and anywhere can easily access the company's system, has become the work habits of employees. CIOs take advantage of, for employees of mobile Office, remote office set up a convenient, safe environment, will undoubtedly win the trust and support of employees.

Improve employee productivity. When employees use their favorite equipment to work, it can often improve his productivity. Employees ' efficient work is the foundation of enterprise Development. A Dell survey showed that 70% of the companies surveyed believed that BYOD could improve employee productivity. The measure of how much productivity is improved becomes the deployment of BYOD. According to a report from Intel, when Intel implemented the BYOD policy in 2011, 17,000 employees were able to increase their work by an average of 57 minutes per day.

Cost savings. Many businesses see BYOD as a cost-efficient device that no longer buys new equipment. For example, VMware CIO Markegan says the company is eliminating 2 million of dollars because of BYOD. There may be doubts that the cost is dwarfed by the cost of deploying BYOD. However, if you take a suitable BYOD solution, you will save a lot of money. The BYOD deployment scenario costs less than $8 on average on a single device, assuming that a 1000-person company would have purchased each $200 device for a two-year period, saving $192,000 after using BYOD, This cost is fully sufficient to deploy a BYOD solution, and it will save more after two years.

Improve operational efficiency. A well-developed BYOD scenario allows it to understand what devices employees use, which pages they visit, and other work. Analysis of these data can effectively improve the IT workflow and improve operational efficiency. For example, through the back-end analysis of BYOD, IT department found that the first floor of the Office building printer usage is too low, but the second floor of the printer is often crowded, as long as the second floor of the staff to transfer the printing requirements to the first floor of this printer, solve the problem, do not have to purchase the printer as before.

BYOx family:

Since the advent of BYOD (bring your own device), the BYOx family has added several members, such as BYOC, BYOA, Byot and so on. The rise of BYOD brings a wave of mobile office.

BYOD bring your own device

With the advent of the iphone, it is undeniable that it has pushed the smartphone market to a climax and that mobile devices have become a necessity for people's lives. This way, it is not inevitable that people will bring their personal devices to the company, and inevitably there is a tendency to bring their own devices (BYOD) to work.

BYOC Bring your own cloud

Now, in the wave of cloud computing, the byoc of the term. What is BYOC? BYOC is a self-bringing cloud computing (Bring-your-own-cloud). As cloud computing gets deeper into people's lives, while working, there will be more and more businesses storing data in the cloud, and BYOC will inevitably be a trend.

BYOA Self-bringing application

Most employees use their own cloud applications and are not malicious, and the IT department should work with employees to find a solution that enables employees to do their jobs and make secret use of cloud applications no longer a problem.

Byot comes with tablet

There is the advent of BYOD, and there is no doubt about the advent of BYOT (with its own tablet). Mobile Office, tablet computer plays a key role. Compared with mobile phones, Byot has a larger usable area, which is more suitable for working with the work content. The BYOT is more convenient than a laptop computer.
In addition, BYOT has another explanation that comes with its own technology. The goal is to enable employees to work anywhere, on-demand, with tools that are optimized. It consumerization and mobile collision, inevitably there will be more and more byot appear.

"BYOD" comes with device information

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.