Consumerization of IT has made organizations to notice the employee’s demand to use device of their choice (like iPad, tablet, smart phone as well as personal laptop) in addition to the traditional assets (i.e. laptop or the desktop) provided by the organization. The devices may either be owned by the employee or organization. After the initial reluctance organizations are now gradually endorsing the Bring Your Own Device (BYOD) demand of its employees. The BYOD has resulted in need for the re-defining the IT strategy to meet the operational and security challenges.
Organizations need to ensure that they have the right strategy to achieve the efficiency and productivity while adequately addressing the security threats.
BYOD like tablets in branches along with the Multi-Channel architecture enables the customer servicing transactions to be completed within the business boundaries without the requirement of the fixed desktop solution. Many renowned Enterprises has allowed BYOD only for its operational applications for a selective group of senior management and some enterprises are monitoring how others are performing and waiting to introduce BYOD with their customized security policies.
This article throws light on the use of the Tablets as BYOD, types of tablets and necessary security controls applied.
With mobile technology advancement and affordability to possess smartphones and tablets by people, high-speed internet at better cost drives work from anywhere and anytime opportunity. This thrives an Enterprise to introduce Bring Your Own Device (BYOD) culture across the globe. This article narrates the risk elements while using BYOD and describes a set of governance and policies to be implemented and list of controls to be deployed before implementing the BYOD.
The capability of an enterprise has increased to handle its business risks and technology risks over a period of time by vast experience, lessons learned during their daily operations and also adopted to new technologies. With the introduction of BYOD (Bring Your Own Device) has increased an enterprise’s boundaries and bringing work to personal device creates storms and anxious around.
The pace at which the technology has changed in the past 5 years and the introduction to the disruptive trends has put most of the existing solutions obsolete or very soon to be obsolete. Organizations have lately started taking security and data seriously and Identity and Access Management (IAM) as a technology has got lot of attention because of the efficiency, compliance requirement, cost savings and minimal human intervention. IAM has grown from a good to have feature in the technology landscape to the most sought after requirement. Organizations moved away from home grown IAM solutions to professional vendors and suppliers to implement it.