Menu
​INSIGHT: Top 5 steps to providing BYOD choice

​INSIGHT: Top 5 steps to providing BYOD choice

“Despite all of the obvious benefits, BYOD comes with new data protection and security concerns for IT departments."

While the bring-your-own-device (BYOD) trend can be a productivity dream come true for both companies and employees, it can be a nightmare for IT administrators trying to deal with data security.

However, with the right technology and systems in place, organisations can make the most of BYOD without compromising sensitive corporate information.

Not only has BYOD transformed how employees do business and get work completed, but it has also started to revolutionise the way in which companies interact with customers.

With mobile devices, business can now be conducted everywhere, any time, with customer interactions have become more streamlined and efficient.

“Despite all of the obvious benefits, BYOD comes with new data protection and security concerns for IT departments,” says Lincoln Goldsmith, general manager, Australia and New Zealand, Acronis.

“Just who, exactly, is accessing critical company data and files? For many IT departments this question, alone, is grounds for concern.

“Adapting to the BYOD landscape isn’t so much about devices as it is about accessing the files and data and using it to interact with other employees or customers.

“To ensure productivity, companies need to create a seamless experience for employees as they work across multiple IT platforms, in multiple environments, and through multiple channels.”

According to Goldsmith, there are five different steps if organisations want to take control of BYOD:

1. Mobile device management (MDM)

As the fundamental first stage for security in the BYOD world, MDM is all about centralising the management of the devices employees are using for work, whether at home or in the office.

That way, workers will have the freedom to use whichever device they want, and IT can monitor access and use, ensuring there’s no data leakage.

2. Mobile file management (MFM)

Once devices are secured, employees will still need to access the files and content they use every day to do their jobs.

MFM guarantees that IT can have complete and secure control over which files are accessed, modified and deleted. This way, companies can go beyond managing devices by directly managing the sensitive data being accessed and used on them.

3. Bridge the old with the new

The BYOD revolution started with MDM, and functionality is expanding with MFM, but now that mobile is a native platform for employees, there are countless productivity apps that are meant for use on-the-go.

When employees travel for work, it’s taken for granted that they’re going to bring personal devices on the trip and use them to check email, collaborate on projects, and manage customer relationships.

4. Mobile-only apps

As mobile becomes a way of life for workers, there will be an explosive growth in apps that are exclusively designed for mobile environments.

Mobile-only apps have a very distinct advantage, because they are built with the knowledge that people will be using them on small touch-screens and constantly be moving around.

Read more: Dell study shows investment in four key technologies is paying off

5. Bridging the new back to the old

After the rapid development of mobile apps, there are going to be bridges built in the other direction.

Just like mainframes never fully went extinct, desktops and the functionality they bring to the working world will remain relevant.

So, new-world mobile apps will need to build bridges back to old-world infrastructures and interfaces.

“By recognising these steps and implementing the technology, and processes underpinning them, companies can get the most of their employees’ devices without compromising their security,” Goldsmith adds.

“With devices acting as the platform for an affordable, connected, data-driven workplace, putting the power of choice back into the hands of the employee becomes mutually beneficial for a company and its employees.”

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags BYODAcronismobilityCloud

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments