By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData Collective
  • Analytics
    AnalyticsShow More
    data science anayst
    Growing Demand for Data Science & Data Analyst Roles
    6 Min Read
    predictive analytics in dropshipping
    Predictive Analytics Helps New Dropshipping Businesses Thrive
    12 Min Read
    data-driven approach in healthcare
    The Importance of Data-Driven Approaches to Improving Healthcare in Rural Areas
    6 Min Read
    analytics for tax compliance
    Analytics Changes the Calculus of Business Tax Compliance
    8 Min Read
    big data analytics in gaming
    The Role of Big Data Analytics in Gaming
    10 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Adopting a Sucessful BOYD Implementation Strategy
Share
Notification Show More
Latest News
ai in automotive industry
AI Is Changing the Automotive Industry Forever
Artificial Intelligence
SMEs Use AI-Driven Financial Software for Greater Efficiency
Artificial Intelligence
data security in big data age
6 Reasons to Boost Data Security Plan in the Age of Big Data
Big Data
data science anayst
Growing Demand for Data Science & Data Analyst Roles
Data Science
ai software development
Key Strategies to Develop AI Software Cost-Effectively
Artificial Intelligence
Aa
SmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Mobility > Adopting a Sucessful BOYD Implementation Strategy
MobilityRisk Management

Adopting a Sucessful BOYD Implementation Strategy

Rick Delgado
Last updated: 2014/02/21 at 8:57 PM
Rick Delgado
5 Min Read
Image
SHARE

ImageEach year, more and more companies are allowing their employees to use their own devices in the workplace. This system, known as “Bring Your Own Device”, or BOYD, poses unique opportunities as well as certain potential problems.

ImageEach year, more and more companies are allowing their employees to use their own devices in the workplace. This system, known as “Bring Your Own Device”, or BOYD, poses unique opportunities as well as certain potential problems. On the positive side, BOYD systems can potentially save companies money by putting the cost of equipment and maintenance in the hands of employees. Employees also have more flexibility and preference for where and when they work. On the other hand, however, security becomes challenging as sensitive data is accessed and altered on personal devices.

Companies are realizing that making the switch to BOYD is more complicated than they may have thought. To help corporations meet the challenges of this new trend, several companies have stepped forward to provide easier implementation. For example, Cisco and Dell both offer their own solutions with programs that provide platforms for BYOD that fit the needs of individual companies.

Regardless of the size of your company, if you are thinking of making the switch to BOYD, there are certain things that must be considered for successful implementation.

More Read

Adjust Windows settings for better data privacy

5 Sneaky Ways Hackers Try to Steal Information

Why Is Data Loss Prevention is Crucial for Business?
How to Protect the Sensitive Data of Your Company with a Secure Web Gateway?
Database Activity Monitoring – A Security Investment That Pays Off
Encryption Importance in the Age of Data Breaches

Understanding business and regulatory processes

Before implementation, a company should take a broad look at each one of its departments, including business, legal and IT. Ideally, a team should be formed to overlook BOYD policy. For each one of the departments, the team should ask, what problems could arise in switching from company owned to employee owned devices? Time and effort should be dedicated to looking ahead in order to avoid unexpected setbacks. What kind of security will be required for each department? How much money will it actually save the company? What regulatory policies might become problematic?

Technical details

There are many technical details that need to be considered. For example, are there certain devices that won’t work with the BYOD system? How will the company allocate bandwidth across devices and locations? If an employee loses a device, will it be possible to wipe data so it is not compromised? Will the company cover the cost of data on mobile devices? Other issues should be considered depending on the specific circumstances of the company.

Understanding legal issues

Certain unexpected legal issues may arise as employees begin using their own devices. These issues must be addressed beforehand. For example, who is liable if private information on a device is lost or tampered with? Who is liable if company data used on a private device is used inappropriately? What kind of privacy protection can an employee expect? Not only must these issues be addressed, employees need to know about them.

Preparing for security issues

Perhaps the biggest challenge is addressing problems that arise with security. Because employees take their devices home with them, it is difficult for companies to keep an eye on who is accessing important data. Individuals also don’t always have strong security set up on their devices. Businesses may need to install programs such as anti-virus software on each person’s device as well as provide technical support. Security policies should be specifically outlined for employees so they know how they are allowed to access and use data.

Of course, employees don’t want company policies to make personal use of their devices more complicated. One potential way to deal with this is device partitioning. Many devices are now designed to support multiple user personas. Security can be implemented to isolate certain data and applications for each persona.

The Installation Process

All facets of the installation process need to be considered to make sure the transition to BYOD is smooth. New user profiles may need to be created. Employees may need a system through which they can service their devices. Features such as virtual desktop and a unified communication platform need to be established and ready to use on multiple devices. If each element of installation is not taken into account, the transition may be rough and employee productivity could sink until things are back up and running.

Rick Delgado February 21, 2014
Share this Article
Facebook Twitter Pinterest LinkedIn
Share
By Rick Delgado
Follow:
All things Big Data, Tech commentator, Enterprise Trends and every once in a while I write for @dell.

Follow us on Facebook

Latest News

ai in automotive industry
AI Is Changing the Automotive Industry Forever
Artificial Intelligence
SMEs Use AI-Driven Financial Software for Greater Efficiency
Artificial Intelligence
data security in big data age
6 Reasons to Boost Data Security Plan in the Age of Big Data
Big Data
data science anayst
Growing Demand for Data Science & Data Analyst Roles
Data Science

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

Adjust Windows settings for better data privacy
PrivacyRisk Management

5 Sneaky Ways Hackers Try to Steal Information

6 Min Read
importance of data loss prevention
Big Data

Why Is Data Loss Prevention is Crucial for Business?

12 Min Read
use a secure web gateway to protect company data
Data Management

How to Protect the Sensitive Data of Your Company with a Secure Web Gateway?

8 Min Read
Security

Database Activity Monitoring – A Security Investment That Pays Off

11 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US

© 2008-23 SmartData Collective. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?