BYOD – Security & Impact of Cloud

July 12, 2013

Bring Your Own Device (BYOD) crept in so slowly that sometimes IT is unaware of the devices being connected to the network. BYOD will require IT departments to combine new product roll outs, educate users and adopt new processes. Factors that influence BYOD are device compatibility, Wi-Fi access, network bandwidth, impact on application performance, and security. Personal technology buying behavior is very different from IT’s buying behavior for corporate technology. Implementing a BYOD policy requires contribution and involvement from all the functional departments. The policy has to establish rules on how software/apps are controlled and monitored.

BT-Cisco survey of 2,200 IT decision-makers in US acknowledges security may be the biggest challenge for companies to overcome when it comes to BYOD. Statistics indicate 33% of global companies have already experienced a security breach due to unauthorized devices being brought in. Other top security risks identified include lack of control over devices; unauthorized data distribution after data is on device, theft/loss of mobile devices and employees leaving the company with insider knowledge/threat to IP. In spite of the challenges, 90% enterprises in the U.S. believe embracing personally-owned devices for work will provide a competitive advantage over those that have not adapted to enterprise mobility yet.

BYOD is a phenomenon of consumerization of IT. Cloud computing is yet another phenomenon of IT consumerization which also influences enterprise mobility to a large extent. Cloud will have a major impact on how mobile devices are being used within the enterprise. Cloud will reduce the gap between mobile and on-mobile devices. Traditional ways of provisioning for mobile devices will be replaced by cloud’s interference. It will simplify many processes like tunnelling through the firewall, case-by-case permission scenario.