By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 2343 |
Pages: 5|
12 min read
Published: Oct 25, 2021
Words: 2343|Pages: 5|12 min read
Published: Oct 25, 2021
In today’s fast-paced world, IT industry is growing enormously and hence consumerization of IT. With the advancement of technology, IT users have to keep them aware and updated of the latest technologies or devices. The IT users thus spend most of their times after work in home to grasp the latest technologies in order to implement them in their organization.
As a result of this they become more familiar or comfortable with the devices they use at home and prefer them in workplace even. Therefore, BYOD management plays an important role in IT industry. In this paper we are going to illustrate the pros and cons of BYOD, BYOD Management tool and alternatives to BYOD.
BYOD or “Bring Your Own Device” is a concept in which an employee usually prefers to use their own device at home as well as workplace. So in BYOD set up, employees need not use different devices for personal and professional purpose – the only same device can be used for multiple purpose. They can learn from anywhere and at any time and make the best utilization of time and knowledge and need not spend time on understanding the device as they are already familiar with it and hence there is no learning curve.
Increased Productivity: As the employee uses their own device, they can work immediately and with ease as they are already familiar with the device and hence saves time and provides increased productivity.
Apart from the advantages of BYOD - Bring your own Device, there are various disadvantages which can be highlighted and discussed:
MDM (Mobile Device Management) solutions are recognized as one of the most important BYOD management tools as BYOD management is nowadays as important as managing the devices in the corporate world. Mobile Device management is regarded as the solution for managing wholesome activities that relates to mobile devices. MDM provides solutions like storing the useful contents about mobile devices, taking decisions on which applications can be present on the devices, locating the devices and securing the devices in case it is stolen or lost.
Working of MDM
MDM is two-tier architecture where devices act as a client and MDM act as a server which manages the devices, configuration, apps and policies. The MDM server is used by IT admins remotely to manage mobile endpoints which contains devices like mobile phones, tablets and laptops of the employees.
Features of MDM
MDM has extensive set of BYOD features and using it we can almost nullify all the disadvantages of BYOD set up and only take benefits of its advantages. The features of MDM are highlighted in the below mentioned points:
Easy and quick onboarding: The employees can register their devices with MDM by making the best utilization of the onboarding methods provided by MDM. The employee receives an invite from the IT admin containing instructions for self-enrollment via E-mail or SMS and after following the simple instructions, the employees receive the credentials by which they can enroll their personal devices for organizational use.
Well planned management of personal devices: In an organization, there are both usage of personal and corporate devices. In order to configure the two different types of devices, separate set of policies are required. This is complex when dealing with large number of devices. MDM has an extravagant feature of accumulating personal devices into separate groups and then associate policies and apps to these groups. At any point of time a personal device can be brought under management after adding to this group and associating with the policy. When a device moves from one group to another, the new groups get automatically associated and the previous policies and groups get removed.
Categorization of corporate data: MDM provides a solution which lets containerization of the corporate data from where only it is accessible without creating disturbance to the personal data. Here the corporate data is encrypted and stored in a logical container which differentiates it from the personal data ensuring that there is no illegal or unauthorized access to the corporate data.
Pre-configuring policies: MDM provides predefined basic configuration policies such as E-mail, Exchange ActiveSync, Wi-Fi etc, on the device so that the employees does not spend extra time in configuring corporate policies.
Handling corporate apps: Using MDM, it becomes easier for the employees to install the apps they need as the IT admin can build an app catalog and create an application service portal. Even the settings can be pre-configured for the apps along with the permissions by making the apps ready to use once they are immediately installed and require very nominal intervention of the user.
Device maintenance: You can initiate and automate OS updates from MDM server in case we encounter that the personal device is running outdated OS versions. The concept of BYOD states that the devices are portable and handy. There are high chances of the device getting lost/stole/misplaced. In such cases in order to prevent the data breach or unauthorized data loss MDM lets you lock the device remotely. To get the exact location of the device you can ring an alarm by locating the device.
Lost Mode can be enabled in case the device is lost and in this case the device gets automatically locked preventing from data accessibility. MDM provides you with the option of resetting the password to make sure that the device cannot be unlocked from the Lost Mode by entering the device password. To handover the device to its authorized owner you can optionally display a message and a contact number. At last, you can also sweep the device to restrict misuse of data.
By viewing the device screen or controlling it you can remotely troubleshoot the device in case the employee faces any issue out of the organizations’ premises. MDM prompts the user to accept a remote session to make the user aware of this. You can deprecate the device which automatically deletes the corporate data leaving behind the personal data unattended in case the employee is leaving the organization.
MDM can be utilized across industries. Below are some use cases:
Case 1: Healthcare
In this century most of the healthcare organizations are stepping forward towards Electronic Health Records (EHRs), as a result usage of mobile devices have become more popular in the healthcare sectors. An MDM provides a solution where the Personal Health Information (PHI) stored on mobile devices remains secure from illegal access.
Case 2: Transportation
The transportation industry is highly benefited with the advantages of MDM. A history of location traversed is well maintained and the business can also track shipment and location of the vehicles by using the MDM solution. Corporate devices can also be locked down to particular applications and/or settings to prevent device miss use and ensure maximum level of productivity.
Case 3: Retail
Mobile devices have also made it possible to enter into the market of retail sector and this is because of digital signage, mPOS, and self-service checkouts. Some enterprises in the retail industry use the combination of in-house application and certain policies on more standard devices like phone and tablets while the others use the mobile devices built for a specific requirement. An MDM solution supports the management of both the specialized devices such as the standard mobile devices rugged devices.
Apart from BYOD, there are other alternatives also available that can also be used by an organization which are as follows:
COPE: Corporate Owned/Personally Enabled is an alternative which allows the employee to use the device for personal and professional use that the organization buys and owns. In order to comply with the customized Mobile Device Management (MDM) and Enterprise Mobility Management (EMM), the employees are allowed to use devices and operating systems that are pre-approved. The company is also able to manage and get rid of sensitive information if required as COPE policy gives corporate data ownership to the company.
CYOD: Choose Your Own Device is an alternative in which the employee is only allowed to use the devices which are added to the whitelist of the organization. This reduces the security issues as the organization is letting the employees only to use the devices that are not prone to threat. Now if the employee’s device does not make the cut, the employee has to purchase new device to meet the organizational needs. CYOD combines the policies of both BYOD and COPE. Here the devices need to be pre-approved so the policy is compatible with the organizations MDM and EMM solution. This policy increases the security and reduces the glitches that comes with BYOD policy. In CYOD, personal and corporate data is not isolated which can increase the risk factor of the organization.
Direct-to-carrier stipends: Direct-to-carrier stipend is an alternative where the employee is assigned with the responsibility of buying their own device and carrier service. The employees are provided with the monthly credit and most of the responsibilities of the organization is taken away.
The organization saves most of the monetary funds by using this option as the amount of the credit is based on the role of the employee and the organization pays just the portion of employee‘s phone bill. A large amount of devices and operating systems have access to organization’s network but the support from within the organization and risk management are highly difficult to get a handle on.
BYOD has various advantages and disadvantages, but implementing it and making it as a good fit for a company wholly depends upon the particular organization. It is always better to be well accustomed to the pros and cons before taking a decision. You should have the following to implement a successful BYOD program: A definite BYOD policy with the defined security policy. An IT overhead to provide assistance to various devices. The infrastructure scalability to handle network traffic. If circumstances permits then BYOD is a great initiative to be implemented in an organization. This initiative allows overall growth of the employee and even increases the productivity of the organization. It encourages the young generation of the 21st century to be successful in the rapidly growing global society.
Browse our vast selection of original essay samples, each expertly formatted and styled