Bottom Line Upfront Bring your own device (BYOD) is an IT policy where
employees are allowed or encouraged to use their
personal mobile devices—and, increasingly, notebook
PCs—to access enterprise data and systems
The concept has gained momentum at the workplace
in many organization but its adoption approaches are
varied
Organization who embrace BYOD concept have many
benefits however its unstructured adoption might be
catastrophic for an organization
It is not a matter of when to allow employees to bring
their own devices to work – it is now a matter of how
to manage BYOD in the work place
3
BYOD Benefits
• Increased productivity provides access to:
• Advanced technology
• Personal applications anytime
• Workforce Mobility leads to:
• An increase in employee satisfaction
• A role change – now called “mobile workers”
• Cost Savings:
• Hardware – employees purchase their own
• Decrease in support
BYOD Risks
RISK ISSUES TYPES OF RISKS
Security • Misuse of mobile technologies
• Lost or stolen personal devices - 70
million Smartphones lost/stolen in 2011
Only 7% Recovered
Human Resources • Labor laws – employees working after
after hours
• Subsidies/reimbursement cost –
taxable income?
Legal Implications • Confidentiality of corporate
information
• Storing sensitive information on
personal devices
Hidden Costs • IT/Network infrastructures
• Support Systems – multiple device
users
• Application usages
• Compliance management
Best Practices
• Registering devices to ensure security:
– Virus protection, authentication,
encryption
• Provisioning of firm-authorized apps
• IT use monitoring
• User education
– Compliance with firm security policies
– Mobile Device registration with IT
– Password protection
– Use of unsanctioned apps
– Lost/stolen devices
BYOD MODELS
Classification of BYOD Models from the least to the
Most flexible (Source: Alberta Education (2012,p.11))
MDM software can only mitigate not eliminate the
BYOD challenges (Moschella,2005)
Devices Owned by the support staff
members
8
Smart Phones
80
(54%)
Laptops
44
(30%)
Tablets
24
(16%)
Distribution of the staff members by the Degree of
Compliance of the Policy Supporting the Components
of BYOD.
10
32
(21.6%)
38
(25.7%)
48
(32.4%)
30
(20.3%)
0
5
10
15
20
25
30
35
Low Medium High Not Sure
Degree of Compliance
Per
centa
ge
Mobile Device Management
• Not new!
• Optimize functionality
• Increase security
• Compliance
• Is MDM a requirement for BYOD?
Common Features OF MDM
• Device provisioning and configuration
• Policy application
• Security
• Backup / restore
• Remote lock and wipe
• Sandboxing
• Activity logging
• Reporting / dashboard
Advanced Features Of MDM
• Network access control
• Application deployment
and management
• Firmware updates
• Diagnostics
• Network usage and
support
• Mobile asset tracking
and management
• Troubleshooting and
diagnostic tools
• Remote control
• Remote administration
• GPS tracking and
'breadcrumb' mapping
Most Common
Platforms
Common in Legal:
• Airwatch
• MobileIron
• McAfee
• Fiberlink (MaaS360)
• Good
• BlackBerry• For BlackBerry Devices
CONCLUSIONIn adopting BYOD; the presence
of benefits means that BYOD can
be implemented or exploited by
organization. The presence of
challenges means that BYOD
should be implemented
cautiously. Thus, hybrid model
guides on how to adopt BYOD so
as to exploit the benefits while at
the same time addressing the
challenge of BYOD in Kenya.
17