SlideShare une entreprise Scribd logo
1  sur  16
BYOD
Bring Your Own Device
Biman Pathirage
06 – 04 – 2016
Geveo Weekly Presentation
Contents
 Introduction
 Popularity of BYOD over time
 Benefits of BYOD – to the employers
 Benefits of BYOD – to the employees
 Risks of BYOD
 How to secure the BYOD environment
 Adoption of BYOD across the world
 Conclusion
Introduction
 BYOD defined as a concept that provides device-independence to
employees in IT organizations. That means, they can use their own
devices in the offices, to do the office work.
 The first use of BYOD was initiated back in 2009 and it has been
growing in popularity ever since.
Introduction
 Mainly SMBs(Small and Medium Businesses), are unable to keep up
with the technology changes in the current tech world when it comes
to physical devices.
 This concept is adapted mostly by SMBs which use a lot of mobile
devices in their work.
Introduction
 Newer technologies – More ahead you are in the race
 But why can’t the companies just provide such latest hardware to the
employees and retain full control over the devices?
“Trying to stand in the path of consumerised mobility is likely to be a
damaging and futile exercise. The best thing that an SMB or
enterprise can do is be aware of the benefits and understand the
risks.”
Popularity Increases…
Benefits of BYOD – to the employers
 Reduces Technology Costs - BYOD programs generally shift costs to
the individual user so companies save a lot of money on up-front device
expenses. The employee will have to pay for his own data and device
maintenance.
 50% of the companies who have implemented BYOD already, require employees to cover
their device expenses, and the employees have agreed.
 Takes Advantage of Newer Devices - Individual users generally
upgrade to the latest hardware more frequently than most organizations,
which means they’ll have access to faster, sleeker, and more capable
devices.
 Improved Productivity – By using their own devices, the employees
are happier at work and in turn increase their productivity.
Benefits of BYOD – to the employees
 Employee Satisfaction - When the employees are able to use the
devices they already know and love, and achieve higher success rates
because of it, they will be happier working for your company.
 Studies have shown that this happiness overpowers the reluctance to pay for their own
devices and services.
 Location Independence – Most employees can work from their
homes if they are using their own devices. They don’t always have to
come to the office to do a quick change to their work.
Risks of BYOD
 Data security – There is no credibility as to with whom the
employee is sharing his organizations’ work, and the amount of
security implemented in the employees device.
 Lost or stolen devices – When devices that are registered in a
BYOD network are lost or stolen, sensitive corporate data can fall into
the hands of an outsider. So this is another threat to the existence of
the BYOD model as well.
 Nearly 4 million handsets have been lost in the past year in America alone, and 45%
of them reported to have been left at public places.
 Fired employees - Typically, retrieving data from the private device
of a fired employee can be a big issue, and this information can easily
be leaked to a rival organization.
How to secure the BYOD environment
 First and foremost, organizations should not implement a BYOD policy
unless they are fully prepared to handle it. It depends on the products
of the organization.
 Use a comprehensive MDM (mobile device management suite) - A
powerful mobile device management solution provides a centralized
dashboard to manage and monitor all the devices connected to a
particular business effectively.
How to secure the BYOD environment
 BYOD policy should include aspects such as how and when corporate
data should be deleted from a device, what type of data can be
accessed through a personal device and what type of encryption
should be done to protect the data inside.
 Implement an effective employee exit strategy.
 Require device registration
 Create a company cloud
 Educate the employees and audit the company network frequently
Adoption of BYOD across the world
BRIC economy countries have shown a major interest in BYOD
Conclusion
 Overall, BYOD is a win-win situation for employees as well as
businesses.
 This is a growing trend in the world at the present, providing a lot of
benefits as well as risks – mostly data risk.
 Before adapting to this technology, all businesses would require to do
some analysis as to whether this really suits their company policies.
 The fact that even some big tech companies such as Intel are using
this concept leads to the conclusion that this is doable, and beneficial
if implemented with proper policies and standards.
Conclusion
“With a sound and security-focused BYOD
policy in place, businesses can mitigate the
risks of BYOD while taking full advantage of
its benefits”
Sources of data
 BYOD: (Bring Your Own Device) Is Your Organization Ready?- Ann Cavoukian, Ph.D.
 http://blog.parallels.com/2014/12/10/what-is-byod/
 http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html
 http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce
 http://www.techradar.com/news/computing/what-is-byod-and-why-is-it-
important--1175088
 http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ow
n_device_.html
 https://www.miradore.com/byod-agile-personal-infrastructure/
Thank You!

Contenu connexe

Tendances

IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 

Tendances (19)

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
Byod
ByodByod
Byod
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Similaire à BYOD

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 

Similaire à BYOD (20)

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

BYOD

  • 1. BYOD Bring Your Own Device Biman Pathirage 06 – 04 – 2016 Geveo Weekly Presentation
  • 2. Contents  Introduction  Popularity of BYOD over time  Benefits of BYOD – to the employers  Benefits of BYOD – to the employees  Risks of BYOD  How to secure the BYOD environment  Adoption of BYOD across the world  Conclusion
  • 3. Introduction  BYOD defined as a concept that provides device-independence to employees in IT organizations. That means, they can use their own devices in the offices, to do the office work.  The first use of BYOD was initiated back in 2009 and it has been growing in popularity ever since.
  • 4. Introduction  Mainly SMBs(Small and Medium Businesses), are unable to keep up with the technology changes in the current tech world when it comes to physical devices.  This concept is adapted mostly by SMBs which use a lot of mobile devices in their work.
  • 5. Introduction  Newer technologies – More ahead you are in the race  But why can’t the companies just provide such latest hardware to the employees and retain full control over the devices? “Trying to stand in the path of consumerised mobility is likely to be a damaging and futile exercise. The best thing that an SMB or enterprise can do is be aware of the benefits and understand the risks.”
  • 7. Benefits of BYOD – to the employers  Reduces Technology Costs - BYOD programs generally shift costs to the individual user so companies save a lot of money on up-front device expenses. The employee will have to pay for his own data and device maintenance.  50% of the companies who have implemented BYOD already, require employees to cover their device expenses, and the employees have agreed.  Takes Advantage of Newer Devices - Individual users generally upgrade to the latest hardware more frequently than most organizations, which means they’ll have access to faster, sleeker, and more capable devices.  Improved Productivity – By using their own devices, the employees are happier at work and in turn increase their productivity.
  • 8. Benefits of BYOD – to the employees  Employee Satisfaction - When the employees are able to use the devices they already know and love, and achieve higher success rates because of it, they will be happier working for your company.  Studies have shown that this happiness overpowers the reluctance to pay for their own devices and services.  Location Independence – Most employees can work from their homes if they are using their own devices. They don’t always have to come to the office to do a quick change to their work.
  • 9. Risks of BYOD  Data security – There is no credibility as to with whom the employee is sharing his organizations’ work, and the amount of security implemented in the employees device.  Lost or stolen devices – When devices that are registered in a BYOD network are lost or stolen, sensitive corporate data can fall into the hands of an outsider. So this is another threat to the existence of the BYOD model as well.  Nearly 4 million handsets have been lost in the past year in America alone, and 45% of them reported to have been left at public places.  Fired employees - Typically, retrieving data from the private device of a fired employee can be a big issue, and this information can easily be leaked to a rival organization.
  • 10. How to secure the BYOD environment  First and foremost, organizations should not implement a BYOD policy unless they are fully prepared to handle it. It depends on the products of the organization.  Use a comprehensive MDM (mobile device management suite) - A powerful mobile device management solution provides a centralized dashboard to manage and monitor all the devices connected to a particular business effectively.
  • 11. How to secure the BYOD environment  BYOD policy should include aspects such as how and when corporate data should be deleted from a device, what type of data can be accessed through a personal device and what type of encryption should be done to protect the data inside.  Implement an effective employee exit strategy.  Require device registration  Create a company cloud  Educate the employees and audit the company network frequently
  • 12. Adoption of BYOD across the world BRIC economy countries have shown a major interest in BYOD
  • 13. Conclusion  Overall, BYOD is a win-win situation for employees as well as businesses.  This is a growing trend in the world at the present, providing a lot of benefits as well as risks – mostly data risk.  Before adapting to this technology, all businesses would require to do some analysis as to whether this really suits their company policies.  The fact that even some big tech companies such as Intel are using this concept leads to the conclusion that this is doable, and beneficial if implemented with proper policies and standards.
  • 14. Conclusion “With a sound and security-focused BYOD policy in place, businesses can mitigate the risks of BYOD while taking full advantage of its benefits”
  • 15. Sources of data  BYOD: (Bring Your Own Device) Is Your Organization Ready?- Ann Cavoukian, Ph.D.  http://blog.parallels.com/2014/12/10/what-is-byod/  http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html  http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce  http://www.techradar.com/news/computing/what-is-byod-and-why-is-it- important--1175088  http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ow n_device_.html  https://www.miradore.com/byod-agile-personal-infrastructure/

Notes de l'éditeur

  1. 1. This is one of the latest trends in the IT industry around the globe.
  2. 2. Specially IT related businesses, who use mobile devices such as smartphones, tablets and even laptops
  3. In most of the cases, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity to compete with the rival companies Well, most pro analysts have arrived at the conclusion below So as professional analysts agree, BYOD is a concept to be embraced rather than be thrown away, if a company wants to stay in the competition
  4. As you can clearly see, the popularity of BYOD over the first half of decade have been increasing dramatically and is expected to be at a big 85% by the end of 2020
  5. Businesses can transfer operational expenses to the user while optimizing revenues. It is predicted that an organization can save up to $100 per month per user through this policy As I have already pointed out in the previous slides, getting up to date is more faster in employees than employers in the current industry
  6. 1. The main problem is that if employees like to use their own devices. But, Studies have shown that this happiness overpowers the reluctance to pay for their own devices and services. So they’d be better off using the devices that they love rather than using a totally strange device issued by the company 2. Sometimes, for a small bug fix or a VoIP meeting with a customer, must the employee come to the office? What if he can do this from where he is right now? So this too leads to the employee preference of BYOD as well So those were some of the benefits of BYOD for both the organizations and the employees. Now let’s take a look at the risks of using BYOD policy
  7. Unsurprisingly the main concern with BYOD model is the security. 1. As most of the people now use smartphones and tablets to surf the internet, these devices have become the primary target for hackers as well. So security of data is the biggest and the most grave threat to the BYOD model 3. An employee might not be honest enough to remove all the sensitive information in his device and its against the law for the employers to clean the devices of their employees as well
  8. For an example if the organization is developing applications for the military, they should never implement BYOD models. Likewise, if the organizations’ information is too sensitive, they should think twice before adapting this method. So it’s evident that this model does not work for all the businesses in operation 2. When a device is lost or stolen, the password can be changed remotely, data and settings can be remotely wiped off, and the device can be reset to factory settings. The device can be controlled even through an SMS. MDM solutions allow you to remotely monitor apps installed on any device, and easily remove malicious applications. The location of each device too can be tracked and a complete location history created.
  9. 2. Access tokens, e-mail access, data and other office related information should be removed completely from an employees device when he resigns. So there should be clear rules for this so that both the parties understand what's at stake before getting in to the BYOD policy 3. Register the MAC address of devices to keep track of them and if required, ban them from the network 4. It enables the company information to be safely accessed from outside of the LAN 5. Do full frequent audits on your network so you are completely aware of every device on site and can pinpoint to the devices when they are new and cause any problem
  10. Now let’s take a look at the adoption of BYOD model across the leading countries of the world. As the economy of 2020 is predicted to be dominated by the BRIC countries, it’s evident that BYOD adoption is going to be more successful than not when we consider the last four columns of this table although there are a lot of drawbacks and complications yet to be solved, because except Russia, all Brazil, India and China are showing much interest in adopting this model to their businesses
  11. By analyzing the benefits to both the employer and employee that I have mentioned previously, we can say that it is a win-win situation for both the parties and it can also be adopted to go together with the agile manifesto, which is being followed by most of the companies in the present As every good thing comes at a cost, this model too has its drawbacks. But if the companies find out successful remedies to those problems, this can be the next major change in the business and technology world. It’s important to do a cost benefit analysis and assess whether this is the right model for your business before adapting it.