BYOD 2.0

Westcon and Comstor continue to work with customers around the world in delivering BYOD solutions to the end-user community.  With any nascent technology, there are doubters as to the true need of securing the device, the network, and the enterprise via technologies such as MDM, NAC, and IPAM.

My point here is that the work done today by resellers and end-users in securing the environment against the onslaught of phones and tablets is a necessary rehearsal for what comes next.  Think Google Glass.  If an organization is not ready to secure itself against the current tablet/smartphone wave, how will it be ready for the more complex set of security challenges inherent in new devices such as Google Glass, that consume and generate significantly more information and pose new complications in terms of security and privacy.

Just like everything else, practice makes perfect – if you have an active, exercised  framework of policies and guidelines that can support the current BYOD phenomena, you will be that much more ready for the next wave of IP-enabled devices.  Wearable technologies such as Google Glass are coming.  Corporations currently relying on security frameworks from 5 years ago is like hoping your moat will keep away a Reaper Drone.

Advertisements

One response to “BYOD 2.0

  1. Bill, I’m with you on the need to look ahead to the next wave of BYOD. Just recently at SXSW, Google revealed the first apps for Glass, including dictation-operated Gmail and Evernote. That shows, in case there was any doubt, that Google really wants Glass to hit the market as a device that people will find useful in productive activities (not just shopping or entertainment). People who get used to being able to dictate emails or notes on the go, without having to stop and fumble with buttons, are not willingly going to leave those capabilities behind when they leave for work. The security consequences of that are unpredictable, though I can imagine some tricky scenarios; it stands to reason that companies with thoughtful, well-executed BYOD frameworks already in place will be the best positioned to adapt. – Ned Boyajian

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s