Mobility is one of the most transformational technologies available today.
In just a few short years, mobile devices have evolved from cool consumer technology into mission-critical enterprise tools. Accordingly, organizations left and right are adopting bring-your-own-device (BYOD) policies to enhance productivity and collaboration while opening the doors to business transformation, competitive advantage and improved performance. In fact, a Dimensional Research survey sponsored by Dell found that 84 percent of organizations already support mobile devices on their networks.
Security is critical to a successful mobility program
Of course, the benefits of BYOD do not come free; rather, BYOD brings a host of technical challenges. Chief among them is security: 44 percent of the 1900+ global organizations surveyed in Dell’s recent Global Technology Adoption Index (GTAI) listed “fear of security breach” as the primary barrier to expanding mobile technologies within the organization. Clearly, reaping the substantial benefits of BYOD requires a carefully considered plan for network and data security.
The first hurdle is providing users with easy yet secure access to the corporate network from their personally owned smartphones and tablets. One approach is the traditional model: have IT manage all devices that access the corporate network. That way, the organization can ensure that all devices are properly maintained with current security software, browser updates and so on.
This old-school approach can work well for corporate-owned devices, but it has important drawbacks for personally owned devices, especially in verticals like education. In particular, it fails to protect the privacy of user data — the organization can see everything on a user’s personal device, from personal texts and emails to Facebook posts and browser history. Even though our culture seems to be growing ever more comfortable with sharing personal information online, most people aren’t comfortable giving their employers this unfettered window into their personal lives. As a result, this approach tends to hamper BYOD adoption, if not bring it to a grinding halt.
Secure mobile workspaces are the most secure way to implement BYOD
Fortunately, there’s a better option: secure mobile workspaces. By downloading a free app to their phone or table, employees (and other authorized users, such as partners or contractors) can establish a VPN-like connection to the corporate network. A customized workspace provides each user with access to only the resources authorized by policy, while keeping personal and corporate data separate and secure.
Specifically, a secure mobile workspace can enable authorized users to access:
Learn more about building a secure mobile enterprise!
This secure virtual workspace is a key ingredient in a broader mobile strategy — what Dell calls the secure mobile enterprise. To learn more, read our whitepaper, “The Secure Mobile Enterprise.”
<p>BYOD is a very horrible issue, and weÂ´ve limited this to mobile devices (smartphones) only.</p>
<p>I found the concept of building a separate BYOD network but not something we can implement at this time due to budgetary restraints.</p>
<p>That's good for software and security, but hardware is where the real problem lies. What do you do when they drop their 5-year old Toshiba laptop? Is that IT's responsibility, or the user's?</p>
<p>Not comfortable at all with BYOD... </p>
<p>Its best to just restrict it totally, they end using your precious bandwidth and its never used for its intended purpose</p>
<p>this is really helpful, we are getting more and more BYOD's</p>
<p>It's hard to get around it when you have a mobile workforce</p>
<p>Fortunately BYOD is not something we have to worry about at the moment</p>
<p>Even when we restrict to some equipments, is a hard challenge.</p>
<p>I'm not a big fan of BYOD, but I know eventually we will get there ..... I like the idea of secure mobile workspaces, I'll be looking into that in more detail.</p>
<p>We are working through this at the moment. Having a separate workspace on the device would be great.</p>
<p>We have limited it as much as we can.</p>
<p>BYOD sounds like a support nightmare to me.</p>