April 2, 2012

BYOD: Avoiding Anarchy

There's no question that bring-your-own-device (BYOD) has become one of the hottest topics around because of the proliferation of smartphones and tablet computers in the enterprise.  The only sane approach is to figure out a strategy for controlling the use of these devices, because banning them from your organization simply isn't going to work.

This Thought Leadership Discussion between Webtorials TechNotes author Gary Audin of Delphi Inc. and Rob Butters, senior solutions marketing manager at Avaya, explores the ins and outs of security, compliance and blending mobile device management (MDM) with your overall communications infrastructure amidst the rash of employee-owned devices attempting to connect to your corporate network.

(Webtorials registration required for access. Click here if you forgot your username/password.)


Hello BYOD gents thanks for the candid comments. The next Geners are pushing the technology landscape.

The business must decide to provision services this entails it's own architecture, access zones, security and identity management and using the correct technologies to provide this to folks in the field.

The real advantage will be when industry can collaborate in the virtual reality world in creating products with their business partners. Disney projects this concept well in the field.

more to come promise.

I can't believe that the BYOD discussion did not mention the use of dual persona software clients on smartphone and tablet devices! That coupled with avoiding any actual information storage on the mobile devices, should help take care of the security concerns for BYOD usage.


Art Rosenberg

BYOD has countless advantages for both the SMB and the Enterprise. But they are only advantages so long as you can maintain security and control. This podcast does a great job of exploring some strategies that can be utilized here.

This also raises another question. We often discussed the advantages to having a limited number of devices to support. BYOD potentially allows a very wide range of devices with multiple operating systems, platforms, etc., to be incorporated into you network fabric.

I would love to hear your ideas on how these seemingly opposing functions might be brought together.

The major challenge from BYOD is the fact that mobile form factors will require customizing user interfaces for every enterprise "mobile app." The variable screen sizes, plus the options for speech commands, will all have to allow for dynamic end user choices. Although these are all parameters that can be accommodated by software, integration with devices still have to be done at the OS level.

We are starting to embrace BYOD, but more because we are a hospital and the doctors are demanding that they can use their smartphones and iPads to send patient info quickly by text message.

The problem is that HIPAA laws in the USA mean that sending patient info by text to a phone can really open up the doctor and hospital up to legal action.

We can't afford some large corporate BYOD system, so we chose to use Tigertext to at least allow doctors to use thier BYOD for texting. Tigertext is HIPAA complaint since it is a closed and secure network and the messages are deleted from the phone/iPad after a set time, and there for meets HIPAA compliance. A cost effective and easy impliment app based solution which is now working for us.

Yes, a large expensive BYOD IT system would be nice, but I think as BYOD becomes more and more prevalent, solutions to all or part of the problem are going to be needed for smaller companies to be able to securely deal with the issue.




Nice comment from John at GGR Healthcare. This should take you to the comment, which had an unintentionally delayed approval.

John is a user of but not an employee of TigerText.

Search Webtorials

Get E-News and Notices via Email




I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites



Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.