- Chapters I and II
- MobileIron
Part I and II in a series designed to help organizations develop their "BYOD" (bring-your-own-device) strategies for personally-owned smartphones and tablets.
Chapter 1 details eight components that our customers have found to be the foundation of a secure and scalable BYOD program. Chapter II compares two technical approaches to BYOD: the walled garden vs. the enterprise workspace. The "enterprise workspace" approach to BYOD is secure, cost-effective, extends to apps, and drives user satisfaction. It allows IT to configure, monitor, and control enterprise data and access across the mobile device without compromising the native user experience. This is the approach MobileIron takes to BYOD.
8 Critical Components to a Scalable BYOD Program:
- Sustainability
- Device Choice
- Trust Model
- Liability
- User Experience and Privacy
- App Design and Governance
- Economics
- Internal Marketing
Download Part 1
Download Part 2
(Webtorials registration required for downloads. Click here if you forgot your username/password.)
BYOD is an unstoppable force. As an integral part of the consumerization of IT, employees will be bringing their smart phones and pads/tablets to work in droves.
So the question is not whether to try to disallow this. Rather, the question is how best to plan for providing appropriate security and control surrounding these devices.
These papers give significant and in-depth insight into appropriate strategies. We look forward to hearing what your reactions are and how you are addressing BYOD.