Sei sulla pagina 1di 9

TABLE OF CONTENT

INTORDUCTION What is BYOD AD-

Advantages
DISDisadvantages COMMON OBJECTIVES

IT INFRASTRUCTURE
MANAGING BYOD DESKTOP CENTAL CLOSURE

INTRODUCTION
What is BYOD Bring your own devices refers to the policy of permitting employees to bring personally owned mobile devices to their workplace, and use those devices to access privileged company information and application

AD-

Advantages/ Benefits

More productive Increase employee moral and convenience by using their own devices Company flexibility; allowing the user to use the device they have selected as their own rather than one selected by the IT team

Cost saving for the company Employee satisfaction or job satisfaction

DIS-

Disadvantages/ Risks

Data breaches; employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone A key issue of BYOD which is often overlooked is BYOD phone number problem, which raises the question of the ownership of the phone number. The issue becomes apparent when employees in sales or other customer facing roles leaves the company and take their phone numbers with them. Customer calling the phone number will then potentially be calling competitors which can lead to loss of business for BYOD enterprises Increase pressure on IT to manage and secure device and data

COMMON OBJECTIVE
Securely integrate devices and visibility and access control Gain productivity by moving employee work tasks closer to point of services Control rising management and security costs Provide consistent user experience anytime and anywhere

IT INFRASTRUCTURE
We meet these objectives by through fully developing integrated architectures involving Wireless LAN (WLAN) and Network Access Control (NAC) WLAN From a WLAN perspective, the challenge of BYOD is security, most office wireless networks were built to facilitate meetings and accommodate guest. They have to support traffic up to three connected devices per worker. This is an especially critical challenge for IT organizations delivering a key service or application to end user via smartphone or tablet Network Access Control

Employees are savvy enough to apply the credentials issued with their corporate notebook to their personal smartphones or tablets, the corporation must be able to detect and block rogue devices regardless of login credentials

MANAGING BYOD DESKTOP CENTRAL


Enrol devices based ownership Create separate groups for BYOD and corporate devices and apply Wipe corporate data, leave user data untouched, when employees leave the organization

CONCLUSION
In conclusion I see company's will, to a certain extent, take back control through offering their employees more of these popular hardware devices which currently are the users own we shall see more and better smartphones, an increasing number of more modern/thinner portable computers and many more tablets, all of which companies will procure and offer their employees.

Where companies themselves offer these to their employees they are able to set up better security solutions and keep a check on what is being used and how. It will also become an important competitive advantage in attracting new employees to their company

Potrebbero piacerti anche