Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Advantages
DISDisadvantages COMMON OBJECTIVES
IT INFRASTRUCTURE
MANAGING BYOD DESKTOP CENTAL CLOSURE
INTRODUCTION
What is BYOD Bring your own devices refers to the policy of permitting employees to bring personally owned mobile devices to their workplace, and use those devices to access privileged company information and application
AD-
Advantages/ Benefits
More productive Increase employee moral and convenience by using their own devices Company flexibility; allowing the user to use the device they have selected as their own rather than one selected by the IT team
DIS-
Disadvantages/ Risks
Data breaches; employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone A key issue of BYOD which is often overlooked is BYOD phone number problem, which raises the question of the ownership of the phone number. The issue becomes apparent when employees in sales or other customer facing roles leaves the company and take their phone numbers with them. Customer calling the phone number will then potentially be calling competitors which can lead to loss of business for BYOD enterprises Increase pressure on IT to manage and secure device and data
COMMON OBJECTIVE
Securely integrate devices and visibility and access control Gain productivity by moving employee work tasks closer to point of services Control rising management and security costs Provide consistent user experience anytime and anywhere
IT INFRASTRUCTURE
We meet these objectives by through fully developing integrated architectures involving Wireless LAN (WLAN) and Network Access Control (NAC) WLAN From a WLAN perspective, the challenge of BYOD is security, most office wireless networks were built to facilitate meetings and accommodate guest. They have to support traffic up to three connected devices per worker. This is an especially critical challenge for IT organizations delivering a key service or application to end user via smartphone or tablet Network Access Control
Employees are savvy enough to apply the credentials issued with their corporate notebook to their personal smartphones or tablets, the corporation must be able to detect and block rogue devices regardless of login credentials
CONCLUSION
In conclusion I see company's will, to a certain extent, take back control through offering their employees more of these popular hardware devices which currently are the users own we shall see more and better smartphones, an increasing number of more modern/thinner portable computers and many more tablets, all of which companies will procure and offer their employees.
Where companies themselves offer these to their employees they are able to set up better security solutions and keep a check on what is being used and how. It will also become an important competitive advantage in attracting new employees to their company