March 16, 2012

Building Bring-Your-Own-Device Strategies

Part I and II in a series designed to help organizations develop their "BYOD" (bring-your-own-device) strategies for personally-owned smartphones and tablets.

Chapter 1 details eight components that our customers have found to be the foundation of a secure and scalable BYOD program.  Chapter II compares two technical approaches to BYOD: the walled garden vs. the enterprise workspace.  The "enterprise workspace" approach to BYOD is secure, cost-effective, extends to apps, and drives user satisfaction. It allows IT to configure, monitor, and control enterprise data and access across the mobile device without compromising the native user experience. This is the approach MobileIron takes to BYOD.

8 Critical Components to a Scalable BYOD Program:
  1. Sustainability
  2. Device Choice
  3. Trust Model
  4. Liability
  5. User Experience and Privacy 
  6. App Design and Governance
  7. Economics
  8. Internal Marketing

Download Part 1

Download Part 2

(Webtorials registration required for downloads. Click here if you forgot your username/password.)

1 Comment

BYOD is an unstoppable force. As an integral part of the consumerization of IT, employees will be bringing their smart phones and pads/tablets to work in droves.

So the question is not whether to try to disallow this. Rather, the question is how best to plan for providing appropriate security and control surrounding these devices.

These papers give significant and in-depth insight into appropriate strategies. We look forward to hearing what your reactions are and how you are addressing BYOD.

Search Webtorials

Get E-News and Notices via Email




I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites



Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.