Download presentation
Presentation is loading. Please wait.
Published byJade Newton Modified over 9 years ago
1
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons
2
Without BYOD
3
With BYOD
4
A device utilized for communicative and informational purposes in the workplace and personal life. Some prominent examples include: Smartphone iPad Laptop Tablet What is BYOD?
5
Technological mobility has fostered a significant impact in most business environments. Ability to remotely create and consume information essential for business operations, and BYOD enables this process. Understand and more importantly have access to tools and resources of a world-wide network imperative to a company. Why BYOD?
6
Employees’ experiences are important. Freedom to choose their own device. In the Work Environment BYOD! “The way we work is changing fast. People adapt differently.”
7
2007: there was an increased rate at which companies began accepting and implementing BYOD. Market Trend
8
Creates a liberal-minded environment for potential employees. Each associate’s technological needs differ at InsureAll, BYOD allow workers to tailor their devices to their individual needs. Corporate systems and data become more accessible than ever. A Few Benefits
9
Mobile devices are becoming more affordable. Not having to provide devices to employees means one less cost for InsureAll. BYOD is a promising system to increase productivity. Benefits (cont.)
10
Mobile devices offer little protection. Risky Viruses & Malware
11
Risking data loss Risky viruses and malware Uninvited guests/Hackers/Intrusions You Can’t Protect What You Don’t Know Source: www.zdnet.com Understanding and managing risks associated with BYOD
12
Policy enforcement Challenges to productivity Further Challenges
13
BYOD Strategies
14
Policy = Simplicity Focusing on policy is the first step Determine which devices are allowed to access the network Determine which devices you will support
15
Separate Work From Fun Work life and personal life should be kept separate. To get network access, employees must agree to acceptable use policies. IT should monitor activity. Make sure employees understand the rules and the risks.
16
BYOD is Here to Stay Will grow in size and scope Presents new challenges and opportunities A BYOD strategy is critical for data security A major trend that is changing IT.
18
http://www.webopedia.com/TERM/V/VoIP.html http://www.webopedia.com/TERM/V/VoIP.html http://www.cioupdate.com/technology-trends/byod-byoc-may- change-everything-about-security.html http://www.cioupdate.com/technology-trends/byod-byoc-may- change-everything-about-security.html http://www.infolawgroup.com/2012/03/articles/byod/the-security- privacy-and-legal-implications-of-byod-bring-your-own-device/ http://www.infolawgroup.com/2012/03/articles/byod/the-security- privacy-and-legal-implications-of-byod-bring-your-own-device/ https://blogs.oracle.com/OracleIDM/entry/develop_and_enforce_ a_bring https://blogs.oracle.com/OracleIDM/entry/develop_and_enforce_ a_bring http://www.itproportal.com/2013/07/25/a-beginners-guide-to- byod-real-solutions-for-the-real-life-issues-facing- enterprises/#ixzz2fLwzkSKk http://www.itproportal.com/2013/07/25/a-beginners-guide-to- byod-real-solutions-for-the-real-life-issues-facing- enterprises/#ixzz2fLwzkSKk www.watchguard.com www.informationweek.com www.informationweek.com ww.w.zdnet.com www.cultofmac.com www.cultofmac.com References
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.