BYOD – Framework

BYOD – Bring Your Own Device

Our conversations with the channel (vendors, resellers, service providers, and systems integrators) around BYOD break into two categories – Security and Productivity. It sometimes helps to frame the categories of the conversation for our customers, and thought we would share some of that here…

Security
BYOD creates a number of security challenges and it sometimes help by breaking down the different ways to look at what needs to be secured:
1. Securing the actual device – We have been working closely with vendors and partners in Mobile Device Management (MDM). This is a very hot topic, and continues to see extensive growth. We are engaged with Mobile device management solutions in three different forms around the world – cloud based, appliance based and data center software based. Within MDM there are four areas of functionality to be assessed for any given solution – Hardware control, Software control, Network Services management and Security management.

2. Securing the network – Our focus here has been around Network Access Control. Reason being, our long-history in networking allows us to work closely with our partners to help them jump on NAC quickly. NAC was last really utilized when companies installed their guest wifi networks, and now that same type of concepts can be applied quickly for a BYOD zone within the wireless architecture as a quick “if you do nothing else, at least do this” type solution. In addition to NAC, IPAM is another area getting more and more activity with our channel partners. There are some excellent vendors who have focused on this market for years, and with BYOD, they now step back into the spotlight again.

3. Enterprise policies – Many of our security partners are working closely with customers on the development or enhancement of employee policy write-ups necessary as BYOD continues to grow. There is a global implication that companies really need to understand since the legal definition and acceptability of wiping a device, as an example, is different around the world.

4. Securing the Data at the source – in addition to the security capabilities that may be available with your MDM solution, organizations still must evaluate their Data Loss Prevention (DLP) policies and solutions. It’s obvious on paper, but sometimes not caught in the BYOD planning, that there has to be a review of the firewalls, WAN opt, Application Acceleration tools and appliances.

Productivity
1. Mobile Application Management – not to be confused with MDM, MAM is all about how the enterprise makes available apps that improve productivity of the employee who decides to utilize their own device. MAM helps the organization properly present to the employee the corporate developed apps as well as the 3rd party apps that are part of the “approved app store” that the enterprise wants to present to the employee.

2. Infrastructure – As organizations take on multiple devices per employee, it is only natural that the bandwidth of the network will need to grow. Wireless/Wired security, port size, and alternate network access technologies such as 4G/LTE and Femtocells are viable components of the new network architecture.

3. Application Enablement – so….about those apps….organizations will turn their developers loose on mobile app development, which is to be expected. But, in addition to those tools, there will be more and more utilities that organizations will incorporate into their toolbox. Two that we see becoming very popular are 1) tools that provide direct access to corporate data. Think of these as mini pipelines into select corporate databases with raw interfaces. And 2) Tools that convert existing corporate applications to fit alternate BYOD form factors such as tablets, phones and phablets.

Hopefully this gives you a framework for how to think about your BYOD project, and perhaps even a mini-checklist for you to use as you consider different aspects of the impact BYOD will have on your organization. This is by no means exhaustive, but has shown to be a good start for our resellers when they partner with Westcon and Comstor to provide BYOD solutions to their end-users.

About these ads

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s