Menu
​INSIGHT: Top 5 steps to providing BYOD choice

​INSIGHT: Top 5 steps to providing BYOD choice

“Despite all of the obvious benefits, BYOD comes with new data protection and security concerns for IT departments."

While the bring-your-own-device (BYOD) trend can be a productivity dream come true for both companies and employees, it can be a nightmare for IT administrators trying to deal with data security.

However, with the right technology and systems in place, organisations can make the most of BYOD without compromising sensitive corporate information.

Not only has BYOD transformed how employees do business and get work completed, but it has also started to revolutionise the way in which companies interact with customers.

With mobile devices, business can now be conducted everywhere, any time, with customer interactions have become more streamlined and efficient.

“Despite all of the obvious benefits, BYOD comes with new data protection and security concerns for IT departments,” says Lincoln Goldsmith, general manager, Australia and New Zealand, Acronis.

“Just who, exactly, is accessing critical company data and files? For many IT departments this question, alone, is grounds for concern.

“Adapting to the BYOD landscape isn’t so much about devices as it is about accessing the files and data and using it to interact with other employees or customers.

“To ensure productivity, companies need to create a seamless experience for employees as they work across multiple IT platforms, in multiple environments, and through multiple channels.”

According to Goldsmith, there are five different steps if organisations want to take control of BYOD:

1. Mobile device management (MDM)

As the fundamental first stage for security in the BYOD world, MDM is all about centralising the management of the devices employees are using for work, whether at home or in the office.

That way, workers will have the freedom to use whichever device they want, and IT can monitor access and use, ensuring there’s no data leakage.

2. Mobile file management (MFM)

Once devices are secured, employees will still need to access the files and content they use every day to do their jobs.

MFM guarantees that IT can have complete and secure control over which files are accessed, modified and deleted. This way, companies can go beyond managing devices by directly managing the sensitive data being accessed and used on them.

3. Bridge the old with the new

The BYOD revolution started with MDM, and functionality is expanding with MFM, but now that mobile is a native platform for employees, there are countless productivity apps that are meant for use on-the-go.

When employees travel for work, it’s taken for granted that they’re going to bring personal devices on the trip and use them to check email, collaborate on projects, and manage customer relationships.

4. Mobile-only apps

As mobile becomes a way of life for workers, there will be an explosive growth in apps that are exclusively designed for mobile environments.

Mobile-only apps have a very distinct advantage, because they are built with the knowledge that people will be using them on small touch-screens and constantly be moving around.

Read more: Dell study shows investment in four key technologies is paying off

5. Bridging the new back to the old

After the rapid development of mobile apps, there are going to be bridges built in the other direction.

Just like mainframes never fully went extinct, desktops and the functionality they bring to the working world will remain relevant.

So, new-world mobile apps will need to build bridges back to old-world infrastructures and interfaces.

“By recognising these steps and implementing the technology, and processes underpinning them, companies can get the most of their employees’ devices without compromising their security,” Goldsmith adds.

“With devices acting as the platform for an affordable, connected, data-driven workplace, putting the power of choice back into the hands of the employee becomes mutually beneficial for a company and its employees.”


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags BYODCloudAcronis

Featured

Slideshows

Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomed 2018 inductees - Chris Simpson, Kendra Ross and Phill Patton - to the third running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing landscape of the technology industry in New Zealand, while outlining ways to attract a new breed of players to the ecosystem. Photos by Gino Demeer.

Reseller News welcomes industry figures for 2019 Hall of Fame lunch
Upcoming tech talent share insights at inaugural Emerging Leaders Forum 2019

Upcoming tech talent share insights at inaugural Emerging Leaders Forum 2019

The channel came together for the inaugural Reseller News Emerging Leaders Forum in New Zealand, created to provide a program that identifies, educates and showcases the upcoming talent of the ICT industry. Hosted as a half day event, attendees heard from industry champions as keynoters and panelists talked about future opportunities and leadership paths and joined mentoring sessions with members of the ICT industry Hall of Fame. The forum concluded with 30 Under 30 Tech Awards across areas of Sales, Entrepreneur, Marketing, Management, Technical and Human Resources. Photos by Gino Demeer.

Upcoming tech talent share insights at inaugural Emerging Leaders Forum 2019
Show Comments