SlideShare a Scribd company logo
1 of 8
Download to read offline
The Ten Commandments of Bring Your Own Device




Thou Shalt Allow BYOD
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT
leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to
procure as many devices as possible and connect them to corporate services en masse. Bring Your Own
Device (BYOD) was born and employees followed with fervor.

There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth
is, they’re doing it already and will continue to burrow noncompliant devices into your network with
or without your permission. Forrester’s study of US information workers revealed that 37% are doing
something with technology before formal permissions or policies are instituted. 1 Further, a Gartner CIO
survey determined that 80% of employees will be eligible to use their own equipment with employee
data on board by 2016. 2

This raises the inevitable question: how will you support workforce desire to use personal apps and devices
while allowing them to be productive in a secure environment that protects corporate data? The Ten
Commandments of BYOD show you how to create a peaceful, secure, and productive mobile environment.



     The Ten Commandments of BYOD
      1.	 Create Thy Policy Before Procuring Technology

      2.	 Seek The Flocks’ Devices

      3.	 Enrollment Shall Be Simple

      4.	 Thou Shalt Configure Devices Over the Air

      5.	 Thy Users Demand Self-Service

      6.	 Hold Sacred Personal Information

      7.	 Part the Seas of Corporate and Personal Data

      8.	 Monitor Thy Flock—Herd Automatically

      9.	 Manage Thy Data Usage

      10.	 Drink from the Fountain of ROI




1
    Benjamin Gray and Christian Kane, “Fifteen Mobile Policy Best Practices,” Forrester Research, January 2011.
2
    Ken Dulaney and Paul DeBeasi, “Managing Employee-Owned Technology in the Enterprise,” Gartner Group, October 2011.


                                                                         2
The Ten Commandments of Bring Your Own Device




1. Create Thy Policy Before Procuring Technology
Like any other IT project, policy must precede technology—yes, even in the cloud. To effectively leverage
mobile device management (MDM) technology for employee owned devices, you still need to decide on
policies. These policies affect more than just IT; they have implications for HR, legal, and security—any
part of the business that uses mobile devices in the name of productivity.

Since all lines of business are affected by BYOD policy, it can’t be created in an IT vacuum. With the
diverse needs of users, IT must ensure they are all part of policy creation.

There’s no one right BYOD policy, but here are some questions to consider:

  •	 Devices: What mobile devices will be supported? Only certain devices or whatever the employee wants?


   According to Forrester, 70% of smartphones belong to users, 12% are chosen from an approved list,
   and 16% are corporate-issued. Some 65% of tablets belong to users, 15% are chosen from a list, and
   16% are corporate issued. In other words, users in most cases bring their own devices.


  •	 Data Plans: Will the organization pay for the data plan at all? Will you issue a stipend, or will the
     employee submit expense reports?


   Who pays for these devices? For smartphones, 70% paid the full price, 12% got a discount, 3% paid
   a partial amount, and in 15% of cases, the company covered the full price. With tablets, 58% bought
   their own, 17% got a corporate discount, 7% shared the cost, and 18% were issued and paid for by
   their companies. (Source: Forrester, 2011)


  •	 Compliance: What regulations govern the data your organization needs to protect? For instance,
     the Health Insurance Portability and Accountability Act (HIPAA) requires native encryption on any
     device that holds data subject to the act.

  •	 Security: What security measures are needed (passcode protection, jailbroken/rooted devices,
     anti-malware apps, encryption, device restrictions, iCloud backup)?

  •	 Applications: What apps are forbidden? IP scanning, data sharing, Dropbox?

  •	 Agreements: Is there an Acceptable Usage Agreement (AUA) for employee devices with corporate data?

  •	 Services: What kinds of resources can employees access—email? Certain wireless networks or VPNs? CRM?

  •	 Privacy: What data is collected from employees’ devices? What personal data is never collected?

No questions are off limits when it comes to BYOD. There must be frank and honest dialog about how
devices will be used and how IT can realistically meet those needs.


                                                            3
The Ten Commandments of Bring Your Own Device




2. Seek the Flock’s Devices
Imagine this. You start using an MDM solution under the assumption your company is supporting 100
or so devices. You’ve kept a meticulous spreadsheet of device types and users—there shouldn’t be any
surprises. But when you first go to view reporting, over 200 devices appear. This scenario is fact, not
fiction. It occurs far more often than you would think.

Don’t live in denial. What you don’t know can hurt you. Understand the current landscape of your
mobile device population before engraving your strategy on stone tablets. To do this, you’ll need a tool
that can communicate in real time with your email environment and detect all the devices connected to
your corporate network. Remember that once ActiveSync is turned on for a mailbox, there are usually no
barriers to syncing multiple devices without IT’s knowledge.

All mobile devices need to be incorporated into your mobile initiative, and their owners need to be
notified that new security policies are swinging into action.



3. Enrollment Shall Be Simple
Nothing breeds noncompliance faster than complexity. Once you identify devices to enroll, your BYOD
program should leverage technology that allows for a simple, low touch way for users to enroll. The
process should be simple, secure, and configure the device at the same time.

In a perfect scenario, users should be able to follow an email link or text that leads to an MDM profile
being created on their device—including accepting the ever-important AUA.



   Think of BYOD as a marriage with the AUA as a prenuptial agreement that ensures a harmonious union.



Instructions should help existing users enroll in the BYOD program. We do recommend existing users
clear their ActiveSync accounts so that you can isolate and manage corporate data on the device. New
devices should start with a fresh profile.

From an IT perspective, you want the ability to enroll existing devices in bulk or for users to self-enroll
their devices. You also need to authenticate employees with a basic authentication process such as
a one-time passcode or use existing corporate directories such as Active Directory/LDAP. Any new
devices trying to access corporate resources should be quarantined and IT notified. This provides IT
with flexibility to block or initiate a proper enrollment workflow if approved, ensuring compliance with
corporate policies.




                                                             4
The Ten Commandments of Bring Your Own Device




4. Thou Shalt Configure Devices Over-the-Air
If there’s one thing your BYOD policy and MDM solution shouldn’t do, it’s bring more users to the help desk.
All devices should be configured over-the air to maximize efficiency for both IT and business users alike.

Once users have accepted the AUA, your platform should deliver all the profiles, credentials, and settings
the employee needs access to including:

  •	 Email, contacts, and calendar

  •	 VPN

  •	 Corporate documents and content

  •	 Internal and public apps

At this point, you’ll also create policies to restrict access to certain applications and generate warnings
when a user goes over their data usage or stipend limit for the month.



5. Give Thy Users Self-Service
And you will be thankful you did. Users want a functioning device, and you want to optimize help desk
time. A robust self-service platform lets users directly perform:

  •	 PIN and password resets in the event that the employee forgets the current one

  •	 Geo-locate a lost device from a web portal, using mapping integration

  •	 Wipe a device remotely, removing all sensitive corporate data

Security, corporate data protection, and compliance are shared responsibilities. It may be a hard pill for
employees to swallow, but there is no chance of mitigating risk without their cooperation. A self-service
portal can help employees understand why they may be out of compliance.




                                                             5
The Ten Commandments of Bring Your Own Device




6. Hold Sacred Personal Information
Of course, BYOD policy isn’t just about protecting corporate data; a well-crafted BYOD program holds
employee data sacred and secure. Personally Identifiable Information (PII) can be used to identify, contact,
or locate a person. Some privacy laws prevent corporations from even viewing this data. Communicate the
privacy policy to employees and make it clear what data you cannot collect from their mobile devices. For
instance, an MDM solution should be able to parse what information it can access and what it cannot, such as:

  •	 Personal emails, contacts, and calendars

  •	 Application data and text messages

  •	 Call history and voicemails

On the other hand, let users know what you collect, how it will be used, and why it benefits them.

An advanced MDM solution can turn privacy policy into a privacy setting to hide the location and software
information on a device. This helps companies meet PII regulations and provides added comfort for
employees by preventing the viewing of personal information on smartphones and tablets. For example:

  •	 Disabling app inventory reporting to restrict administrators from seeing personal applications

  •	 Deactivating location services to prevent access to location indicators such as physical address,
     geographical coordinates, IP address, and WiFi SSID

Transparency and clarity are important watchwords. There’s much less resistance to BYOD policies when
everyone knows the rules.



7. Part the Seas of Corporate and Personal Data
For BYOD to be an agreement both IT and end users can live with, personal information like birthday
party photos or that great American novel should be isolated from productivity apps.

Simply stated, corporate apps, documents, and other materials must be protected by IT if the employee
decides to leave the organization, but personal email, apps, and photos should be untouched by corporate IT.

Not only will users appreciate the freedom of this approach, but so will IT, whose life will be infinitely
easier as a result. With this approach, IT can selectively wipe corporate data when an employee leaves
the company. Depending on the circumstances, if an employee loses the device, the entire device can be
wiped. But only a true MDM solution can give you the choice.



   Some 86% of device wipes are selective; only corporate data is wiped.




                                                            6
The Ten Commandments of Bring Your Own Device




8. Monitor Thy Flock—Herd Automatically
Once a device is enrolled, it’s all about context. Devices should be continuously monitored for certain
scenarios, and automated policies should be in place. Is the user trying to disable management? Does
the device comply with security policy? Do you need to make adjustments based on the data you are
seeing? From here, you can start understanding any additional policies or rules to create. Here are a few
common issues:

  •	 Getting to the “Root” of Jailbreaking: To get paid apps for free, employees sometimes “jailbreak”
     or “root” a phone, opening the door to malware that can steal information. If a device is jailbroken,
     the MDM solution should be able to take action such as selectively wiping corporate data from the
     device immediately.

  •	 Spare the Wipe; Send an SMS: If time wasters like Angry Birds rub against corporate policies but
     are not offenses, an immediate wipe is heavy handed. An MDM solution can enforce policies based
     on the offense. MDM can message the user, offering time to remove the application before IT hits
     the wipe button.

  •	 New Operating System Available. For BYOD to remain effective, users need a simple way to be alerted
     when a new OS is ready for installation. With the right MDM solution, OS upgrades become a self-service
     function. Restricting out-of-date OS versions ensures compliance and maximizes device operability.



9. Manage Thy Data Usage
A BYOD policy largely takes IT out of the communications business, but most companies still need to help
employees manage their data use in order to avoid excessive charges.

If you pay for the data plan, you may want a way to track this data. If you are not paying, you may want
to help users track their current data usage. You should be able to track in-network and roaming data
usage on devices and generate alerts if a user crosses a threshold of data usage.

You can set roaming and in-network megabit limits and customize the billing day to create notifications
based on percentage used. We also recommend educating users on the benefits of using WiFi when
available. Automatic WiFi configuration helps ensure devices automatically connect to WiFi while in
corporate locations.

If the stipend plan only covers $50 or 200 MB of data usage a month, employees appreciate a warning
that they’re about to be responsible for overages.




                                                           7
The Ten Commandments of Bring Your Own Device




10. Drink from the Fountain of ROI
While BYOD shifts responsibility for purchasing devices to employees, it’s worth considering the big
picture and long-term costs for your organization.

As you’re writing policy, consider how that policy will impact ROI. That includes comparing approaches,
as shown in the following table:

   Corporate-owned model                                           BYOD

   How much you’d spend on each device                             The cost of a partially subsidized data plan

   The cost of a fully subsidized data plan                        The eliminated cost of the device purchase

   The cost of recycling devices every few years                   The cost of a mobile management platform

   Warranty plans

   IT time and labor in managing the program


One size never fits all, but a carefully crafted BYOD policy arms you with the direction you need to
manage mobile devices effectively and efficiently.

Of course, productivity increases are often seen when employees are mobile and connected at all times.
BYOD is a great way to bring this advance in productivity to new users who may not have been eligible for
corporate devices previously.



BYOD: The Security of Freedom
BYOD is an emerging best practice for affording employees the freedom to work on their own devices while
relieving IT of significant financial and management burdens, but BYOD will never deliver on these promises of
streamlined management and cost savings without a well-written policy and a robust management platform.

If you’ve decided BYOD is right for your business, click here to start using MaaS360 for thirty days free. Since
MaaS360 is cloud-based, your test environment immediately becomes production with no loss of data.

If you’re still in the early stages of your mobile strategy, MaaS360 offers a wealth of educational
resources including the following:

www.maas360.com	
http://www.maas360.com/products/mobile-device-management/	
MaaSters Center

All brands and their products, featured or
referred to within this document, are trademarks   For More Information
or registered trademarks of their respective       To learn more about our technology and services visit www.maaS360.com.
holders and should be noted as such.
                                                   1787 Sentry Parkway West, Building 18, Suite 200 | Blue Bell, PA 19422
                                                   Phone 215.664.1600 | Fax 215.664.1601 | sales@fiberlink.com
                                                                      8

More Related Content

What's hot

Security that works
Security that worksSecurity that works
Security that works
James1280
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
Lou Milrad
 
iPads and other tablets for Legal Aid
iPads and other tablets for Legal AidiPads and other tablets for Legal Aid
iPads and other tablets for Legal Aid
Jane Ribadeneyra
 

What's hot (19)

Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Security that works
Security that worksSecurity that works
Security that works
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper1 p 14-0714 wearable technology part 2 blue paper
1 p 14-0714 wearable technology part 2 blue paper
 
Ch12
Ch12Ch12
Ch12
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
 
iPads and other tablets for Legal Aid
iPads and other tablets for Legal AidiPads and other tablets for Legal Aid
iPads and other tablets for Legal Aid
 
Big data security
Big data securityBig data security
Big data security
 

Viewers also liked

Ten commandments - First Commandment GRADE 8
Ten commandments - First Commandment GRADE 8Ten commandments - First Commandment GRADE 8
Ten commandments - First Commandment GRADE 8
MrsSevCTK
 
10 Commandments for Great Presentations
10 Commandments for Great Presentations10 Commandments for Great Presentations
10 Commandments for Great Presentations
NFN Labs
 

Viewers also liked (6)

Ten Commandments and the Beatitudes
Ten Commandments and the BeatitudesTen Commandments and the Beatitudes
Ten Commandments and the Beatitudes
 
Ten Commandments of Formal Methods: A decade later
Ten Commandments of Formal Methods: A decade laterTen Commandments of Formal Methods: A decade later
Ten Commandments of Formal Methods: A decade later
 
Ten commandments - First Commandment GRADE 8
Ten commandments - First Commandment GRADE 8Ten commandments - First Commandment GRADE 8
Ten commandments - First Commandment GRADE 8
 
natural law and the ten commandments
natural law and the ten commandmentsnatural law and the ten commandments
natural law and the ten commandments
 
10 Commandments of Public Speaking
10 Commandments of Public Speaking10 Commandments of Public Speaking
10 Commandments of Public Speaking
 
10 Commandments for Great Presentations
10 Commandments for Great Presentations10 Commandments for Great Presentations
10 Commandments for Great Presentations
 

Similar to Ten Commandments of BYOD

Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
MidmarketIBM
 

Similar to Ten Commandments of BYOD (20)

Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
Byod
ByodByod
Byod
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
BYOD
BYODBYOD
BYOD
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 

More from K Singh

9767410 - Index
9767410 - Index9767410 - Index
9767410 - Index
K Singh
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
K Singh
 
Gapps connector guide_for _bes
Gapps connector guide_for _besGapps connector guide_for _bes
Gapps connector guide_for _bes
K Singh
 
Byod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoByod four steps to enabling your network michael greco
Byod four steps to enabling your network michael greco
K Singh
 
Exchange active sync for developers
Exchange active sync for developersExchange active sync for developers
Exchange active sync for developers
K Singh
 
Exchange 2010 e_book
Exchange 2010 e_bookExchange 2010 e_book
Exchange 2010 e_book
K Singh
 

More from K Singh (8)

9767410 - Index
9767410 - Index9767410 - Index
9767410 - Index
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Gapps connector guide_for _bes
Gapps connector guide_for _besGapps connector guide_for _bes
Gapps connector guide_for _bes
 
Byod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoByod four steps to enabling your network michael greco
Byod four steps to enabling your network michael greco
 
Exchange active sync for developers
Exchange active sync for developersExchange active sync for developers
Exchange active sync for developers
 
Exchange Active Sync Troubleshooting
Exchange Active Sync TroubleshootingExchange Active Sync Troubleshooting
Exchange Active Sync Troubleshooting
 
Exchange 2010 e_book
Exchange 2010 e_bookExchange 2010 e_book
Exchange 2010 e_book
 
Database mirroring setup
Database mirroring setupDatabase mirroring setup
Database mirroring setup
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Ten Commandments of BYOD

  • 1.
  • 2. The Ten Commandments of Bring Your Own Device Thou Shalt Allow BYOD The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor. There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. Forrester’s study of US information workers revealed that 37% are doing something with technology before formal permissions or policies are instituted. 1 Further, a Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 2016. 2 This raises the inevitable question: how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? The Ten Commandments of BYOD show you how to create a peaceful, secure, and productive mobile environment. The Ten Commandments of BYOD 1. Create Thy Policy Before Procuring Technology 2. Seek The Flocks’ Devices 3. Enrollment Shall Be Simple 4. Thou Shalt Configure Devices Over the Air 5. Thy Users Demand Self-Service 6. Hold Sacred Personal Information 7. Part the Seas of Corporate and Personal Data 8. Monitor Thy Flock—Herd Automatically 9. Manage Thy Data Usage 10. Drink from the Fountain of ROI 1 Benjamin Gray and Christian Kane, “Fifteen Mobile Policy Best Practices,” Forrester Research, January 2011. 2 Ken Dulaney and Paul DeBeasi, “Managing Employee-Owned Technology in the Enterprise,” Gartner Group, October 2011. 2
  • 3. The Ten Commandments of Bring Your Own Device 1. Create Thy Policy Before Procuring Technology Like any other IT project, policy must precede technology—yes, even in the cloud. To effectively leverage mobile device management (MDM) technology for employee owned devices, you still need to decide on policies. These policies affect more than just IT; they have implications for HR, legal, and security—any part of the business that uses mobile devices in the name of productivity. Since all lines of business are affected by BYOD policy, it can’t be created in an IT vacuum. With the diverse needs of users, IT must ensure they are all part of policy creation. There’s no one right BYOD policy, but here are some questions to consider: • Devices: What mobile devices will be supported? Only certain devices or whatever the employee wants? According to Forrester, 70% of smartphones belong to users, 12% are chosen from an approved list, and 16% are corporate-issued. Some 65% of tablets belong to users, 15% are chosen from a list, and 16% are corporate issued. In other words, users in most cases bring their own devices. • Data Plans: Will the organization pay for the data plan at all? Will you issue a stipend, or will the employee submit expense reports? Who pays for these devices? For smartphones, 70% paid the full price, 12% got a discount, 3% paid a partial amount, and in 15% of cases, the company covered the full price. With tablets, 58% bought their own, 17% got a corporate discount, 7% shared the cost, and 18% were issued and paid for by their companies. (Source: Forrester, 2011) • Compliance: What regulations govern the data your organization needs to protect? For instance, the Health Insurance Portability and Accountability Act (HIPAA) requires native encryption on any device that holds data subject to the act. • Security: What security measures are needed (passcode protection, jailbroken/rooted devices, anti-malware apps, encryption, device restrictions, iCloud backup)? • Applications: What apps are forbidden? IP scanning, data sharing, Dropbox? • Agreements: Is there an Acceptable Usage Agreement (AUA) for employee devices with corporate data? • Services: What kinds of resources can employees access—email? Certain wireless networks or VPNs? CRM? • Privacy: What data is collected from employees’ devices? What personal data is never collected? No questions are off limits when it comes to BYOD. There must be frank and honest dialog about how devices will be used and how IT can realistically meet those needs. 3
  • 4. The Ten Commandments of Bring Your Own Device 2. Seek the Flock’s Devices Imagine this. You start using an MDM solution under the assumption your company is supporting 100 or so devices. You’ve kept a meticulous spreadsheet of device types and users—there shouldn’t be any surprises. But when you first go to view reporting, over 200 devices appear. This scenario is fact, not fiction. It occurs far more often than you would think. Don’t live in denial. What you don’t know can hurt you. Understand the current landscape of your mobile device population before engraving your strategy on stone tablets. To do this, you’ll need a tool that can communicate in real time with your email environment and detect all the devices connected to your corporate network. Remember that once ActiveSync is turned on for a mailbox, there are usually no barriers to syncing multiple devices without IT’s knowledge. All mobile devices need to be incorporated into your mobile initiative, and their owners need to be notified that new security policies are swinging into action. 3. Enrollment Shall Be Simple Nothing breeds noncompliance faster than complexity. Once you identify devices to enroll, your BYOD program should leverage technology that allows for a simple, low touch way for users to enroll. The process should be simple, secure, and configure the device at the same time. In a perfect scenario, users should be able to follow an email link or text that leads to an MDM profile being created on their device—including accepting the ever-important AUA. Think of BYOD as a marriage with the AUA as a prenuptial agreement that ensures a harmonious union. Instructions should help existing users enroll in the BYOD program. We do recommend existing users clear their ActiveSync accounts so that you can isolate and manage corporate data on the device. New devices should start with a fresh profile. From an IT perspective, you want the ability to enroll existing devices in bulk or for users to self-enroll their devices. You also need to authenticate employees with a basic authentication process such as a one-time passcode or use existing corporate directories such as Active Directory/LDAP. Any new devices trying to access corporate resources should be quarantined and IT notified. This provides IT with flexibility to block or initiate a proper enrollment workflow if approved, ensuring compliance with corporate policies. 4
  • 5. The Ten Commandments of Bring Your Own Device 4. Thou Shalt Configure Devices Over-the-Air If there’s one thing your BYOD policy and MDM solution shouldn’t do, it’s bring more users to the help desk. All devices should be configured over-the air to maximize efficiency for both IT and business users alike. Once users have accepted the AUA, your platform should deliver all the profiles, credentials, and settings the employee needs access to including: • Email, contacts, and calendar • VPN • Corporate documents and content • Internal and public apps At this point, you’ll also create policies to restrict access to certain applications and generate warnings when a user goes over their data usage or stipend limit for the month. 5. Give Thy Users Self-Service And you will be thankful you did. Users want a functioning device, and you want to optimize help desk time. A robust self-service platform lets users directly perform: • PIN and password resets in the event that the employee forgets the current one • Geo-locate a lost device from a web portal, using mapping integration • Wipe a device remotely, removing all sensitive corporate data Security, corporate data protection, and compliance are shared responsibilities. It may be a hard pill for employees to swallow, but there is no chance of mitigating risk without their cooperation. A self-service portal can help employees understand why they may be out of compliance. 5
  • 6. The Ten Commandments of Bring Your Own Device 6. Hold Sacred Personal Information Of course, BYOD policy isn’t just about protecting corporate data; a well-crafted BYOD program holds employee data sacred and secure. Personally Identifiable Information (PII) can be used to identify, contact, or locate a person. Some privacy laws prevent corporations from even viewing this data. Communicate the privacy policy to employees and make it clear what data you cannot collect from their mobile devices. For instance, an MDM solution should be able to parse what information it can access and what it cannot, such as: • Personal emails, contacts, and calendars • Application data and text messages • Call history and voicemails On the other hand, let users know what you collect, how it will be used, and why it benefits them. An advanced MDM solution can turn privacy policy into a privacy setting to hide the location and software information on a device. This helps companies meet PII regulations and provides added comfort for employees by preventing the viewing of personal information on smartphones and tablets. For example: • Disabling app inventory reporting to restrict administrators from seeing personal applications • Deactivating location services to prevent access to location indicators such as physical address, geographical coordinates, IP address, and WiFi SSID Transparency and clarity are important watchwords. There’s much less resistance to BYOD policies when everyone knows the rules. 7. Part the Seas of Corporate and Personal Data For BYOD to be an agreement both IT and end users can live with, personal information like birthday party photos or that great American novel should be isolated from productivity apps. Simply stated, corporate apps, documents, and other materials must be protected by IT if the employee decides to leave the organization, but personal email, apps, and photos should be untouched by corporate IT. Not only will users appreciate the freedom of this approach, but so will IT, whose life will be infinitely easier as a result. With this approach, IT can selectively wipe corporate data when an employee leaves the company. Depending on the circumstances, if an employee loses the device, the entire device can be wiped. But only a true MDM solution can give you the choice. Some 86% of device wipes are selective; only corporate data is wiped. 6
  • 7. The Ten Commandments of Bring Your Own Device 8. Monitor Thy Flock—Herd Automatically Once a device is enrolled, it’s all about context. Devices should be continuously monitored for certain scenarios, and automated policies should be in place. Is the user trying to disable management? Does the device comply with security policy? Do you need to make adjustments based on the data you are seeing? From here, you can start understanding any additional policies or rules to create. Here are a few common issues: • Getting to the “Root” of Jailbreaking: To get paid apps for free, employees sometimes “jailbreak” or “root” a phone, opening the door to malware that can steal information. If a device is jailbroken, the MDM solution should be able to take action such as selectively wiping corporate data from the device immediately. • Spare the Wipe; Send an SMS: If time wasters like Angry Birds rub against corporate policies but are not offenses, an immediate wipe is heavy handed. An MDM solution can enforce policies based on the offense. MDM can message the user, offering time to remove the application before IT hits the wipe button. • New Operating System Available. For BYOD to remain effective, users need a simple way to be alerted when a new OS is ready for installation. With the right MDM solution, OS upgrades become a self-service function. Restricting out-of-date OS versions ensures compliance and maximizes device operability. 9. Manage Thy Data Usage A BYOD policy largely takes IT out of the communications business, but most companies still need to help employees manage their data use in order to avoid excessive charges. If you pay for the data plan, you may want a way to track this data. If you are not paying, you may want to help users track their current data usage. You should be able to track in-network and roaming data usage on devices and generate alerts if a user crosses a threshold of data usage. You can set roaming and in-network megabit limits and customize the billing day to create notifications based on percentage used. We also recommend educating users on the benefits of using WiFi when available. Automatic WiFi configuration helps ensure devices automatically connect to WiFi while in corporate locations. If the stipend plan only covers $50 or 200 MB of data usage a month, employees appreciate a warning that they’re about to be responsible for overages. 7
  • 8. The Ten Commandments of Bring Your Own Device 10. Drink from the Fountain of ROI While BYOD shifts responsibility for purchasing devices to employees, it’s worth considering the big picture and long-term costs for your organization. As you’re writing policy, consider how that policy will impact ROI. That includes comparing approaches, as shown in the following table: Corporate-owned model BYOD How much you’d spend on each device The cost of a partially subsidized data plan The cost of a fully subsidized data plan The eliminated cost of the device purchase The cost of recycling devices every few years The cost of a mobile management platform Warranty plans IT time and labor in managing the program One size never fits all, but a carefully crafted BYOD policy arms you with the direction you need to manage mobile devices effectively and efficiently. Of course, productivity increases are often seen when employees are mobile and connected at all times. BYOD is a great way to bring this advance in productivity to new users who may not have been eligible for corporate devices previously. BYOD: The Security of Freedom BYOD is an emerging best practice for affording employees the freedom to work on their own devices while relieving IT of significant financial and management burdens, but BYOD will never deliver on these promises of streamlined management and cost savings without a well-written policy and a robust management platform. If you’ve decided BYOD is right for your business, click here to start using MaaS360 for thirty days free. Since MaaS360 is cloud-based, your test environment immediately becomes production with no loss of data. If you’re still in the early stages of your mobile strategy, MaaS360 offers a wealth of educational resources including the following: www.maas360.com http://www.maas360.com/products/mobile-device-management/ MaaSters Center All brands and their products, featured or referred to within this document, are trademarks For More Information or registered trademarks of their respective To learn more about our technology and services visit www.maaS360.com. holders and should be noted as such. 1787 Sentry Parkway West, Building 18, Suite 200 | Blue Bell, PA 19422 Phone 215.664.1600 | Fax 215.664.1601 | sales@fiberlink.com 8