In mobile computing, the keyword being bandied around is BYOD or Bring Your Own Device.
BYOD is a trend in businesses that allow employee-owned devices within a business. Smartphones are the most common example but employees also take their own tablets, laptops and USB drives into the workplace.
While some mobile devices are provided by the company and already have security measures and mobile device policies applied, oftentimes businesses let the individually owned devices to be utilized. These mobile devices are often unprotected, have access to sensitive information, and increase the risk of data compromise, viruses, ransom ware, Trojans and other intrusive and damaging apps.
Meeting the desires of the employees to use their own devices with the security needs of the business may be a complex process.
Most devices, if they are managed, go through a MDM (Mobile Device Management) product. These products have streamlined self-service (manage through check lists) options and provide organizations with the ability to protect company data separately from personal information. MDMs need to be able to
1. Remotely configure WiFi and email.
2. Deploy apps
3. View device details, and keep a running inventory of devices.
4. Remotely be able to lock or wipe a device
5. Deploy security including lock screen codes, encryption, etc.
When your business is ready to include BYOD , you can contact ZenIT.
Alan McCullough is one of the few Austin professionals certified in MTC + (Mobile Technology Competency – Plus) and can bring his expertise to your BYOD implementation.