How to Enrich your MDM Tool to Purge BYOD Challenges

By CIOReview | Wednesday, September 28, 2016
586
964
184

Gen X are going tech savvy and live ecosystem where mobile phones are more in number than people. Daily lives of people are becoming smarter, starting from home to work everyone uses their own smart gadgets or devices. While working, employees of the company love using their personal devices. Steve Jobs once said, “The only way to do great work is to love what you do.” BYOD (Bring Your Own Device) has combined corporate and personal world, allowing employees to use their devices for both personal and corporate works, allowing employees to work flexibly anytime remotely. By allowing personal devices to access corporate information, BYOD is improving efficiency of the employee and optimizing their productivity; a study by Microsoft said that 67 percent of workers love to use their personal devices while at work. With growing popularity of BYOD, companies are adhered onto security and data management issues, which are causing information governance problems for their organizations. To secure and control corporate data, companies are investing on different Mobile Data Management (MDM) tools available in the market, but CIOs are in constant search of an improvised and secure MDM tool that can idealize their BYOD utilization. 

Must Read:   MDM vs Customer 360 Doing the Math

As CIO’s are facing BYOD management problems some experts with best BYOD practices are considering these tips to best utilize BYOD offerings:

Clear the Air: A CIO must drive BYOD management efforts by ensuring that all departments—IT, software architecture and development, business decision making, human resource and legal—be kept on the same page about what can and cannot be accessed. Reports from the survey performed by IDC revealed that 70 percent of the employees access corporate information from their personal devices despite the directives telling them not to do so. To curb such unauthorized access many companies have invested in products such as Microsoft SharePoint with an on-premise infrastructure. Microsoft SharePoint allows network administrators to leverage Active Directory to control and manage access of sensitive corporate information.

Implement strong policy guidelines: Employees who are a part of BYOD should be fastened with a strong legal policy or guidelines by acquiring signatures on the BYOD policy agreements. These governance policies must also include terms on the various technologies provided by the mobile devices like GPS, cameras, and audio recorders. For instance, an organization may suffer intellectual loss if anin-development smartphone’s video is made and posted publically before the official release. So policies must be designed to secure such leaks.

BYOD experts say that encryption and access control are the two most important functions that must be deployed on any device, which has access to corporate data. Therefore, policies regarding usage of insecure Wi-Fi networks need to be pinned in the agreement. Theft, loss, and exit policies are crucial points where technical issues raise security risks. Here is a citation as to how theft or exit policies play a role in raising technical issues, when an employee leaves the job, say from the sales department, and takes all of the contacts on their personal device, that is a big corporate asset that goes missing. And this catapults security risks.        

Create credentials and One-Time Passwords (OTP): Use of credentials and OTPs for different users may help mitigate the risk. Credentials are usernames and passwords provided to the user. Whereas, OTP is a stronger extra layer of authentication service offered when employee logs in through mobile phones, tablets, and PCs by generating random passwords, which cannot be reused. This process is simple, agile and secured; and can be used for large scale deployments, and strengthens enterprise network security.

Stop kicking tires on BYOD management program, there are many vendors in the market who provide mobile device management suites—AirWatch, AmTel MDM, Exitor DME, FancyFon, IBM, Symantec, Zenprise and many more. Selecting an MDM tool for optimizing BYOD empowers network admin to have greater control over the user’s device, reducing the dependability and cost incurred on third party processes.