you're reading...

5 BYOD Device Management Strategies for Securing Your Network

In our last blog post – 4 IT Risks and Challenges with BYOD Device Management – we highlighted some things that IT needs to be aware of when it comes to maintaining control of network security in a BYOD environment. We closed with the fact that IT must face the reality that BYOD is here and they need to enforce a BYOD strategy as part of their service to the organization. So what can you do, and where should you start?

Here are 5 BYOD device management strategies you can use to secure your corporate network and prevent data loss:

  1. Create a policy. In an effort to make BYOD as simple as possible to manage, create a broad list of acceptable devices that can access your corporate network. The policy should also clearly outline which devices and operating systems the company will and will not support. In this way, your employees know what they will ultimately be responsible for.
  2. Get insights before making decisions. One of the biggest mistakes we see in creating a BYOD strategy is the failure to know what employees are doing on the network. Take a benchmark snapshot via firewall logs and reports, so you can gain insight as to what devices are actually connected to the network, and perhaps more importantly, what applications are being used.
  3. Manage passwords more effectively. Password management is something that most organizations do not do a good job with (read one of our previous blogs – We May Know Your Password). User generated passwords are traditionally weak, compromising network security. Make sure that any passwords used on mobile devices in the office environment follow the same rigor as required for office-owned technology.
  4. Understand your own compliance needs. Is your organization subject to regulatory controls, such as HIPAA or PCI DSS? If so, be sure that damage controls are in place so that if an employee loses a smartphone or tablet, it can be wiped to avoid data loss.
  5. Limit access via VPN technologies. For businesses that require higher degrees of protection, you may want to limit access controls to devices that support some level of VPN connectivity. This way a secure connection is required to access corporate data, regardless of where a consumer device is used.

With the future of computing swaying more and more toward mobile, you’ll face an uphill battle against BYOD adoption, so embrace it. But remember that communicating your BYOD policy, and updating it as needed, is critical.

For more information on BYOD device management and mobile device security solutions, check out our recent whitepaper – BYOD: Bring Your Own Device – or Bring Your Own Danger? You’ll also find 5 more strategies for managing BYOD effectively in your organization.


No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: