Menu
​INSIGHT: Top 5 steps to providing BYOD choice

​INSIGHT: Top 5 steps to providing BYOD choice

“Despite all of the obvious benefits, BYOD comes with new data protection and security concerns for IT departments."

While the bring-your-own-device (BYOD) trend can be a productivity dream come true for both companies and employees, it can be a nightmare for IT administrators trying to deal with data security.

However, with the right technology and systems in place, organisations can make the most of BYOD without compromising sensitive corporate information.

Not only has BYOD transformed how employees do business and get work completed, but it has also started to revolutionise the way in which companies interact with customers.

With mobile devices, business can now be conducted everywhere, any time, with customer interactions have become more streamlined and efficient.

“Despite all of the obvious benefits, BYOD comes with new data protection and security concerns for IT departments,” says Lincoln Goldsmith, general manager, Australia and New Zealand, Acronis.

“Just who, exactly, is accessing critical company data and files? For many IT departments this question, alone, is grounds for concern.

“Adapting to the BYOD landscape isn’t so much about devices as it is about accessing the files and data and using it to interact with other employees or customers.

“To ensure productivity, companies need to create a seamless experience for employees as they work across multiple IT platforms, in multiple environments, and through multiple channels.”

According to Goldsmith, there are five different steps if organisations want to take control of BYOD:

1. Mobile device management (MDM)

As the fundamental first stage for security in the BYOD world, MDM is all about centralising the management of the devices employees are using for work, whether at home or in the office.

That way, workers will have the freedom to use whichever device they want, and IT can monitor access and use, ensuring there’s no data leakage.

2. Mobile file management (MFM)

Once devices are secured, employees will still need to access the files and content they use every day to do their jobs.

MFM guarantees that IT can have complete and secure control over which files are accessed, modified and deleted. This way, companies can go beyond managing devices by directly managing the sensitive data being accessed and used on them.

3. Bridge the old with the new

The BYOD revolution started with MDM, and functionality is expanding with MFM, but now that mobile is a native platform for employees, there are countless productivity apps that are meant for use on-the-go.

When employees travel for work, it’s taken for granted that they’re going to bring personal devices on the trip and use them to check email, collaborate on projects, and manage customer relationships.

4. Mobile-only apps

As mobile becomes a way of life for workers, there will be an explosive growth in apps that are exclusively designed for mobile environments.

Mobile-only apps have a very distinct advantage, because they are built with the knowledge that people will be using them on small touch-screens and constantly be moving around.

Read more: Dell study shows investment in four key technologies is paying off

5. Bridging the new back to the old

After the rapid development of mobile apps, there are going to be bridges built in the other direction.

Just like mainframes never fully went extinct, desktops and the functionality they bring to the working world will remain relevant.

So, new-world mobile apps will need to build bridges back to old-world infrastructures and interfaces.

“By recognising these steps and implementing the technology, and processes underpinning them, companies can get the most of their employees’ devices without compromising their security,” Goldsmith adds.

“With devices acting as the platform for an affordable, connected, data-driven workplace, putting the power of choice back into the hands of the employee becomes mutually beneficial for a company and its employees.”


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags BYODCloudAcronis

Featured

Slideshows

Leading female front runners of the Kiwi ICT industry honoured at 2019 WIICTA

Leading female front runners of the Kiwi ICT industry honoured at 2019 WIICTA

Reseller News has honoured the leading female front runners of the New Zealand ICT industry at the 2019 Women in ICT Awards (WIICTA) in Auckland. The awards recognised standout individuals across six categories, spanning Entrepreneur, Rising Star, Shining Star, Community, Technical and Achievement. Photos by Gino Demeer.

Leading female front runners of the Kiwi ICT industry honoured at 2019 WIICTA
Reseller News kicks off awards season in 2019 with Judges' Lunch

Reseller News kicks off awards season in 2019 with Judges' Lunch

The 2019 Reseller News Innovation Awards has kicked off with the Judges Lunch in Auckland with 70 judges in the voting panel. The awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors. Photos by Christine Wong.

Reseller News kicks off awards season in 2019 with Judges' Lunch
Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomed 2018 inductees - Chris Simpson, Kendra Ross and Phill Patton - to the third running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing landscape of the technology industry in New Zealand, while outlining ways to attract a new breed of players to the ecosystem. Photos by Gino Demeer.

Reseller News welcomes industry figures for 2019 Hall of Fame lunch
Show Comments