About
Subscribe

The rise and pitfalls of BYOD

To BYOD or not to BYOD?

Johannesburg, 15 Aug 2012

South African companies are becoming increasingly open to using mobile technologies to empower worker mobility and support work-from-home scenarios; and whether it's by design or default, employees' personal mobile devices are proliferating enterprises at a rapid rate.

On the plus side, a bring your own device (BYOD) model approach simplifies the hardware allocation and management component of a mobile strategy. Instead of the employer furnishing employees with devices and deploying them, employees are responsible for their own devices and carry the costs of purchasing them, paying insurance, and very often, the subscription fees.

BYOD also keeps employees happy, as mobile devices are highly personalised, and individuals can cater to their preferences. These are often resolute but vary from person to person in proportion to the array of devices available. Companies need to embrace diversity in order to satisfy employees. In return, they are rewarded with a more agile, dynamic and productive workforce.

While there are good arguments to support a BYOD model, there are some obstacles that need to be managed.

Dries Morris, the Operations Director at Securicom, a specialist provider of managed IT security services, including a cloud-based mobile device management (MDM) using Zenprise (ZenCloud as either a public, private or hybrid cloud and on-premise solution) says IT and data security are the big issues.

"Employees might use one or more mobile devices, and every unmanaged device that is allowed to connect to the network exposes it to a number of security threats. There is always a risk that a device could be jail-broken or rooted, and have unsecured or infected applications installed, which could compromise network and data security. Employees are also very likely to be using the same mobile devices they use for work to browse the Internet, for social networking and downloading Internet resources.

"Furthermore, when employees bring their personal mobile devices to work and use them to share files or data inside and outside the office, it is also difficult to maintain visibility and control over company information.

"We are seeing a very similar problem to the one which the advent of USB data storage devices brought about. Users are able to move intellectual property from the company-owned infrastructure and onto personal-owned devices. And so, data leakages and loss of sensitive business information is a significant risk," he says.

Although BYOD brings with it complex security challenges, Morris says these aren't reason enough to ditch the idea. Security is an issue with company-issued devices as well.

Michael Hutchinson, Infrastructure Product Manager at Blue Turtle Technologies, which has the rights to distribute Zenprise technologies in South Africa and offers it as an on-premise solution to companies, agrees.

"Whether devices are company-owned or employees' personal devices, there is a need to manage how they can be used, what services or applications can be run on them; and what resources can be accessed by the users of those devices. Any unmanaged device could expose the entire organisation to malware, espionage and other risks, including liability.

"E-mail attachments are where the security risks multiply. The loss of a single attachment of financial planning, customer contact information or even building schematics could push the organisation into regulatory non-compliance.

"These threats emphasise the importance of implementing a proper MDM solution," says Hutchinson, adding that a MDM solution combined with a well-defined BYOD security policy allows companies to quickly and securely leverage the power of mobile technology across the enterprise.

"Almost everybody has a smartphone nowadays. So BYOD has the potential to make companies substantially more efficient and better-able to quickly respond to an ever-changing marketplace. One of the most exciting possibilities presented by a BYOD policy is that it will enable easy video-conferencing. This means employees will be able to hold meetings wherever they are, using their own computing devices," he says.

Morris concludes: "BYOD can work and it can be made secure by enforcing a security policy around BYOD and by implementing MDM technology. With a robust but flexible and easy-to-use solution, organisations have the flexibility to implement best-fit strategies, even if it means allowing a mix of BYOD and corporate-issued devices."

Share

Blue Turtle

Blue Turtle Technologies provides solutions for optimising, enhancing and leveraging existing IT investment, and supporting the cost-effective delivery of new technology initiatives. With experience from mainframe to desktop, Blue Turtle delivers solutions for the effective management of IT infrastructures employing innovative software products, backed by 'best-practice' implementation services. Blue Turtle's strategy leverages 'best-in-class' software products brought together from leading international and South African software providers to deliver compelling and cost-effective technology management solutions to customers. For more information, visit http://www.blueturtle.co.za.

For more information regarding Blue Turtle Technologies, please contact:

Michael Hutchinson

Tel (011) 206 5600 / michaelh@blueturtle.co.za

Securicom

Securicom is a specialist IT security management and consulting company offering an end-to-end range of fully-hosted and managed IT security services.

All Securicom's solutions utilise world-leading technologies, which are innovatively packaged together for their individual strengths and combined with Securicom's expertise, to deliver comprehensive protection against known and emerging threats.

Securicom's services include: advanced e-mail content filtering and management (e-Purifier); hosted e-mail archiving and retrieval (MailVault); e-mail branding (e-Branding); vulnerability scanning (Securiscan); perimeter protection (Managed Firewalls); optimised wide area data services (Managed WDS); remote access security (Securicom SSL VPN) and Optimised Remote Access Services; and WebSecure, which inspects, filters and cleans inbound and outbound Web traffic to combat browser-based threats, such as bots, phishing and other malicious active content.

Securicom has offices in Johannesburg, Cape Town and Namibia, and offers its services in 10 other African countries.

For more information on Securicom, please visit http://zc.securicom.co.za.

For more Securicom media-related information, please contact: Kerry Webb on (082) 496 0713.

Editorial contacts

Dana Jedrisko
Blue Turtle Technologies
(+27) 11 206 5600
danaj@blueturtle.co.za