Page 24 - gs140102
P. 24
TheMobileBuzz
on the same physical device," Moka5 said, which makes
securing devices and corporate data problematic. The
solution, according to the researchers, is to separate the
two.
Moka5 said enterprises can virtualize a network, which
puts a protective container around sensitive data and
only allows employees limited access to the network
via the virtual filter. Alternatively, security software
can be installed on physical devices to secure corporate
resources. Moka5 favors the virtualization approach. "The
devices themselves must be treated as untrusted," Moka5
said. "So it makes sense for IT [information technology]
to focus on securing the data, as opposed to the devices
Watch your BYOD themselves."
Financial considerations must also be weighed. Companies
can let employees pay for devices outright, limit the
obile devices are not just leading the evolu- purchase of said devices to certain retailers that have
tion of payment processing; they are spur- special arrangements with the business, or the company
ring changes in the workplace as well. An can purchase the devices itself. Different taxation burdens
M increasing number of today's employees arise depending on which path an enterprise chooses.
not only want, but expect, to use smartphones, laptops
and tablets at work, fostering the bring your own device Another cost metric involves software licensing. "When
(BYOD) movement. But the advantages of BYOD in pro- using virtual desktops, the enterprise may need to pay for
ductivity and worker retention are tempered by imple- two software licenses (one for the physical desktop and
mentation challenges, namely legal, security and cost one for the virtual machine)," Moka5 said. "Licensing costs
issues. are an important component of calculating multiyear ROI
projections."
According to the Moka5 white paper, Nuts and Bolts:
Planning and Implementing an Effective BYOD Program, BYOD or bust
BYOD programs are proliferating widely in corporate
America – with great benefits for employees and Moka5 conducted a survey of 335 IT professionals in
employers. However, whether the programs have the June 2012 that concluded BYOD is not a growing trend,
proper technology parameters and safeguards is at issue. but an already prevalent practice. Seventy-eight percent
of survey respondents said their companies already had
Moka5, which specializes in BYOD implementations, cited some form of BYOD policy in place. Employees have
Cisco Systems Inc. research that quantified the annual grown accustomed to being always connected and always
value of BYOD programs for corporations: $300 for each reachable, which fuels the assumption that they should
"knowledge worker" and up to $1,300 for every executive. be able to work anywhere and anytime, and have the
"Multiply these figures by the number of employees in flexibility to conduct personal business via those devices
your enterprise, and you'll see that BYOD is a very good at the same time.
deal … but only if implemented correctly," Moka5 said.
In its survey, Moka5 also found that of the 22 percent of
Legal, security and cost factors respondents who said their companies do not have BYOD
policies, half ignore that fact and use their own devices
Legal, security and financial considerations dominate anyway, Moka5 said. The popularity of BYOD thus means
Moka5's discussion, making the case for BYOD complex. businesses must implement sound programs.
Enterprises can put themselves in legal jeopardy if they
don't define the scope of BYOD programs. Some questions Moka5 believes the best solutions separate corporate data
employers need to ask include: and processes from employees' personal counterparts,
ensuring that data – such as viruses – from unsecured
• What happens if an employee's mobile device is networks never touch the enterprise work environment.
subpoenaed for a court case? However, a BYOD program that fails to do this can have
• When can an employer access an employee's negative consequences. "A poorly implemented BYOD
email and other data that had been generated by program can elevate support challenges to nightmare
a mobile device? levels," Moka5 said.
• How does an employer monitor the use of mobile
devices? Nevertheless, Moka5 stated that the benefits of BYOD
outweigh the challenges, "letting the corporation reap the
Security is another sticking point. "Implementing a BYOD benefits of enhanced productivity; happier employees; and
program means placing both business and personal data lower administration, hardware and support costs."
24
24
on the same physical device," Moka5 said, which makes
securing devices and corporate data problematic. The
solution, according to the researchers, is to separate the
two.
Moka5 said enterprises can virtualize a network, which
puts a protective container around sensitive data and
only allows employees limited access to the network
via the virtual filter. Alternatively, security software
can be installed on physical devices to secure corporate
resources. Moka5 favors the virtualization approach. "The
devices themselves must be treated as untrusted," Moka5
said. "So it makes sense for IT [information technology]
to focus on securing the data, as opposed to the devices
Watch your BYOD themselves."
Financial considerations must also be weighed. Companies
can let employees pay for devices outright, limit the
obile devices are not just leading the evolu- purchase of said devices to certain retailers that have
tion of payment processing; they are spur- special arrangements with the business, or the company
ring changes in the workplace as well. An can purchase the devices itself. Different taxation burdens
M increasing number of today's employees arise depending on which path an enterprise chooses.
not only want, but expect, to use smartphones, laptops
and tablets at work, fostering the bring your own device Another cost metric involves software licensing. "When
(BYOD) movement. But the advantages of BYOD in pro- using virtual desktops, the enterprise may need to pay for
ductivity and worker retention are tempered by imple- two software licenses (one for the physical desktop and
mentation challenges, namely legal, security and cost one for the virtual machine)," Moka5 said. "Licensing costs
issues. are an important component of calculating multiyear ROI
projections."
According to the Moka5 white paper, Nuts and Bolts:
Planning and Implementing an Effective BYOD Program, BYOD or bust
BYOD programs are proliferating widely in corporate
America – with great benefits for employees and Moka5 conducted a survey of 335 IT professionals in
employers. However, whether the programs have the June 2012 that concluded BYOD is not a growing trend,
proper technology parameters and safeguards is at issue. but an already prevalent practice. Seventy-eight percent
of survey respondents said their companies already had
Moka5, which specializes in BYOD implementations, cited some form of BYOD policy in place. Employees have
Cisco Systems Inc. research that quantified the annual grown accustomed to being always connected and always
value of BYOD programs for corporations: $300 for each reachable, which fuels the assumption that they should
"knowledge worker" and up to $1,300 for every executive. be able to work anywhere and anytime, and have the
"Multiply these figures by the number of employees in flexibility to conduct personal business via those devices
your enterprise, and you'll see that BYOD is a very good at the same time.
deal … but only if implemented correctly," Moka5 said.
In its survey, Moka5 also found that of the 22 percent of
Legal, security and cost factors respondents who said their companies do not have BYOD
policies, half ignore that fact and use their own devices
Legal, security and financial considerations dominate anyway, Moka5 said. The popularity of BYOD thus means
Moka5's discussion, making the case for BYOD complex. businesses must implement sound programs.
Enterprises can put themselves in legal jeopardy if they
don't define the scope of BYOD programs. Some questions Moka5 believes the best solutions separate corporate data
employers need to ask include: and processes from employees' personal counterparts,
ensuring that data – such as viruses – from unsecured
• What happens if an employee's mobile device is networks never touch the enterprise work environment.
subpoenaed for a court case? However, a BYOD program that fails to do this can have
• When can an employer access an employee's negative consequences. "A poorly implemented BYOD
email and other data that had been generated by program can elevate support challenges to nightmare
a mobile device? levels," Moka5 said.
• How does an employer monitor the use of mobile
devices? Nevertheless, Moka5 stated that the benefits of BYOD
outweigh the challenges, "letting the corporation reap the
Security is another sticking point. "Implementing a BYOD benefits of enhanced productivity; happier employees; and
program means placing both business and personal data lower administration, hardware and support costs."
24
24