Evolve IP’s recent Mobility and BYOD Survey revealed that nearly all businesses (95 percent) either support or enable mobility and/or Bring Your Own Device (BYOD) policies.
While there are some benefits of BYOD programs, the main challenge for many organizations is determining what technologies to put in place that will enable mobility, but also protect critical company data.
With the steadily growing adoption rate of cloud services such as IP phone systems and virtual desktops, true mobility programs are easier than ever to implement. For example, a VoIP phone system offers the ability to easily configure your desk phone number to forward to your cell phone with the click of the mouse. A desktop solution such as Desktop as a Service (DaaS) or Virtual Desktop Infrastructure (VDI) allows users to access their desktop on any device, even an iPad.
One major concern some organizations have about implementing a BYOD program revolves around security – both data loss and theft along with virus issues. This is not an unfounded concern. In fact, the Evolve IP survey found that, 39 percent of employees surveyed that are using company-owned or secured devices admit to using non-IT-approved cloud applications on those devices. But, with such tools as Remote Monitoring & Management (RMM) and Mobile Device Management (MDM), organizations can easily resolve those concerns.
With RMM for desktops the IT staff gains point and click configuration management, patch management, performance reporting, and remote control in a single pane of glass regardless of the location and type of end-user environment.
By managing BYOD with an MDM solution, IT can secure, configure, locate or even erase unrecoverable mobile devices that are used for business. This enables IT to protect critical company assets while ensuring end user productivity on a consumer device.
As with any policy there are specific questions that need to be clarified internally about how devices are to be used. For example, what happens if a device breaks while on company property doing company work? What restrictions on browsing need to be placed while on the corporate network? Which apps will be allowed and which will be banned?
Some good sample policies/policy templates that we found can be located here:
IT Manager Daily: BYOD Policy Template
SHRM Sample BYOD Policy (Requires membership)
With the infrastructure and management capabilities from a cloud services provider like Evolve IP coupled with a set of clearly defined rules an organization’s BYOD policy is easily enabled and managed, and your data is secure.