Preview

Solving the Byod Problem for the Enterprise

Best Essays
Open Document
Open Document
3615 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Solving the Byod Problem for the Enterprise
Team #3 Brenton Trammell Joshua Glover Jacob Irving BCIS 4690 11/14/12

Bring Your Own Device
“Solving The BYOD Problem For The Enterprise”

Page | 1

I.

Introduction Enterprise computing, as we know it, is facing a dimensional shift with the widespread

diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work environment to handle business needs. With employees using their own devices, CIOs and IT departments across the nation are frantically trying to keep up with their employees by ensuring their networks are safe and secure. There is no doubting mobile devices have taking over a big part of our lives. These devices travel with us wherever we go while always being within a short reach away. People are beginning to realize the usefulness of getting work done from their own mobile devices. With this trend enterprises are in need of a policy for employees bringing their own devices to work. Although a relaxed BYOD policy can offer an organization many benefits, it tends to be a double edged sword. A lax policy leaves sensitive data vulnerable; an overly strict one stifles employees trust relationship with their employer. A balance must be struck between offering employees a pleasant and enjoyable work environment and maintaining the security of enterprise data. As the expectations of workspace personnel evolve, organization leaders must find ways to adapt and overcome the challenges that arise when corporate culture has a conflict with social standards and consumer trends. Management must consider the potential detriment to the workforce



Cited: Aala Santhosh Reddy. (June 2012). Bring Your Own Device (BYOD) - Making It Work For Your Organization. In Slideshare.com for Cognizant Research Center. Retrieved , from http://www.slideshare.net/cognizant/making-byod-work-for-your-organization 13450463. BYOD Policy Implementation Guide. London: Absolute Software, 2012. PDF. Cisco Systems, Inc.. (2012). Cisco Identity Services Engine Software 1.1.1 (aka 1.1MR). In Cisco. Retrieved , from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5712/ps11637/ps11195/qa_ 67-658591.html. Ericka Chickowski. (June 19, 2012). Visibility and Control Still an Issue With BYOD Policies. I Network Computing: For IT By IT. Retrieved , from http://www.networkcomputing.com/security/visibility-and-control-still-an-issue wi/240002308. Gibson, C. (2004). It-enabled business change: An approach to understanding and managing risk. Retrieved from http://papers.ssrn.com/sol3/papers.cfm? ISACA. (2009). The risk it framework. Retrieved from http://www.isaca.org/Knowledge Center/Risk-IT-IT-Risk-Management/Pages/Risk-IT1.aspx IT Governance Institute. (2008). Enterprise value: Governance of it investments. the val it framework 2.0. Retrieved from http://www.isaca.org/KnowledgeJoe McKendrick. (October 23, 2012). 10 steps for writing a secure BYOD policy. In ZDNet.com. Retrieved , from http://www.zdnet.com/10-steps-for-writing-a-secure-byod-policy 7000006170/ Jonathan Hassell. (May 17, 2012). 7 Tips for Establishing a Successful BYOD Policy. In CIO.com. Retrieved , from Page | 15 http://www.cio.com/article/706560/7_Tips_for_Establishing_a_Successful_BYOD_Poli y. Kaneshige, T . (March 06, 2012). BYOD: Making Sense of the Work-Personal Device Blur. In CIO.com. Retrieved , from http://www.cio.com/article/701545/BYOD_Making_Sense_of_the_Work_Personal_De ce_Blur. Kenneth Corbin. (August 23, 2012). BYOD Security Demands Mobile Data Protection Strategy. In CIO.com. Retrieved , from http://www.cio.com/article/714550/BYOD_Security_Demands_Mobile_Data_Protecti n_Strategy. Lundblad, J. (2003). A review and critique of rogers ' diffusion of innovation theory as it applies to organizations.Organization Development Journal, 21(4), 50-64. Retrieved from http://search.proquest.com/docview/197971687?accountid=7113 Miller, K., Voas, J., Hurlburt, G. (2012). BYOD: Security and Privacy Considerations. IT Professionals. 14 (5), 53-55. Retrieved from http://ieeexplore.ieee.org Mark Pendleton. (August 13, 2012). Top Concerns When Creating a BYOD Policy. In NEC Corporation of America. Retrieved , from http://info.necunified.com/bid/153070/Top Concerns-When-Creating-a-BYOD-Policy. Rob Humphrey. (March 07, 2012). Manage Risks & Reap Rewards: BYOD. In Kensington Safe Zone with Rob Humphrey - Blog . Retrieved , from http://blog.kensington.com/security/2012/03/07/manage-risks-reap-rewards-byod/. Zachman, J. (2008). John Zachman 's concise definition of the zachman framework. Retrieved from http://www.zachman.com/about-the-zachman-framework Page | 16

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Agree to proper use of their devices when working with company data both on-site and off-site…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In the 1990’s Mobile Data commercial applications begin to appear with devices like pagers, personal digital assistants (PDA), cell phones with text messaging and laptops. Mobile data also started to disappear this was due to companies started offering better packages that could be used not just locally but nationwide. PDA’s Cellular phone and laptop computers are a huge part of the criminal justice system. (Magnuson, 2009).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Best Essays

    EBOOK COLLECTION: Chapter 13 - Turban. (2003). Introduction to information technology (8th Ed.). New York: Wiley. University of Phoenix. Retrieved April 05, 2008. MBA/502 – Managing Business Enterprise https://ecampus.phoenix.edu/content/eBookLibrary/content/eReader.h…

    • 1432 Words
    • 6 Pages
    Best Essays
  • Better Essays

    BYOD implementation seems like a viable option for various companies, businesses, and educational institutions worldwide. This practice appears to save money for the company. It also increases portability and access for employees. BYOD is a forward thinking and innovative solution. As these entities grow, their hardware/software needs increase what better way to eliminate high costs.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The main two methods for Enterprise-Level implementation are Internet systems and Client Server Network systems. There is significant difference in the design of between these two types of systems because of architecture.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Flare Case

    • 2639 Words
    • 11 Pages

    NSA accused for spying on US citizens through third party technological companies (Menn & Weber, 2013)…

    • 2639 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Business Case for Investment

    • 2337 Words
    • 10 Pages

    Tschanz, D. W. (2008). Microsoft Exchange Server 2007 Infrastructure Design: A Service-Oriented Approach. Hoboken, NJ: John Wiley and Sons.…

    • 2337 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Erp Implementation

    • 8034 Words
    • 33 Pages

    This paper appears in the publication, Journal of Cases on Information Technology, Volume 11, Issue 2 edited by Mehdi Khosrow-Pour © 2009, IGI Global…

    • 8034 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    Intel BYOD

    • 514 Words
    • 3 Pages

    Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices was a fad - Could say no to devices.. As a company policy - Supporting BYOD Plan - Had a 48 hr web jam where employees can voice about the BYOD trend.. - Create a 5 tier model to manage security ○ Lv 1.. Stock movements ○ Lv 2.. Slightly confidential info like payroll ○ Lv 3- call basic and had the least permissive level of access to corporate data ○ Lv4- intermediate- consisted of applications pertaining to specific lines of busines ○ Lv5- Managed equivalent.. Was most permissive level of…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Management and Technology

    • 5718 Words
    • 16 Pages

    Graham-Hyde Matt , (2014),"Technology is reinventing your business", Strategic Direction, Vol. 30 Iss 4 pp. 1 – 2 http://dx.doi.org/10.1108/SD-04-2014-0055…

    • 5718 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    IT Management Assignment 3: None of Our Business, Roberta A. Fusaro, a 2004 HBR Case Study I. RFID Definition Radio Frequency Identification – RFID – is...…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Byod Pro's and Con's

    • 2327 Words
    • 10 Pages

    “Forrester Research reported in July of 2011 that nearly 60 percent of companies allow employees to use personal devices for work. “Bring Your Own Device (BYOD)” policies allow employees maximum choice and flexibility but raise new challenges in maintaining the personal privacy of the user, managing and securing valuable corporate information assets, and providing IT with an unpredictable and inconsistent mobile environment. There are also mobile technology considerations, while mobile devices are surpassing PCs and laptops as a user’s primary computing platform, they do have limited access to power, network and hardware resources. Devising a BYOD solution that will support both personal and business roles requires attention to all of these challenges”.…

    • 2327 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    More and more organizations are seeking to integrate the core functions of their business with technological advances. Enterprise systems facilitate this integration process through a single software architecture that links all aspects of business to function as one unit.…

    • 789 Words
    • 4 Pages
    Good Essays

Related Topics