BYOD Made Manageable Enterprise Brief How to balance good IT security practices with user privacy and personal data protection to increase user adoption of BYOD programs The rise of smartphones as an umatched personal productivity champion has resulted in an always-connected, modern, mobile workforce—and a big challenge for IT management. Smar tphone ownership is ubiquitous, and Privacy matters to users most employees are bringing them to work, O u r s m a r t p h o n e s c a r r y t h e m o s t p r i v a te re g a rd l e s s of c o m pa ny p o li cy. In th e pa st kinds of data: our personal correspondence, few years, IT managers have tried various photos, contacts, and documents. Even the i te r a t i o n s o f p e r s o n a l d e v i c e p o l i c i e s : choice of apps installed on the device can ever y thing from an outright ban of personal r e ve a l ve r y p r i v a te i n f o r m a t i o n a b o u t o u r devices to a wide open policy of Bring Your hobbies, habits, and lifestyle. It’s no surprise Own Device ( BYOD). The success (or failure) t h a t m o s t e m p l oye e s a r e r e l u c t a n t to g i ve of a BYOD program hinges on user adoption, access to that information by enrolling their r e q u i r i n g t h e r i g h t b a l a n c e of I T c o n t r o l personal smar tphone in a Mobile Device and personal privacy. This paper outlines Management ( MDM ) system controlled a strate g y fo r str ik in g th at ba l a n c e a n d b y t h e i r o r g a n i z a t i o n’s I T g r o u p. m a k i n g BYO D w o r k . Critical elements of successful BYOD Alleviate IT security concerns Ensure privacy for the user Reduce program cost and complexity Increased user adoption W h e n BYO D p ro g ra m s fa il, o n e c o m m o n Striking the balance r e a s o n i s u s e r s’ r e l u c t a n c e to vo l u n te e r Both users and IT have per fectly valid access—or even the perception of access —o f t h i s p e r s o n a l d a t a to a n I T a d m i n . Personal privacy mat ters, and users are i n c re a s i n g l y s e ns i ti ve to a ny at te m pt at breaching the privacy barrier in the name of I T c o n t r o l. concerns. T he employee doesn’t want to give up access and control of their private d a t a , a n d t h e I T a d m i n d o e s n’ t w a n t to ex p o s e t h e i r i n te r n a l n e t wo r k to t h r e a t s from unsecured endpoints. For many organizations, this logjam meant failure for their BYOD program. Security matters to IT For the IT manager, the idea of unfet tered One solution to satisf ying both concerns access to internal resources from personal is to rethink the role of MDM as it applies d e v i c e s w i t h u n k n ow n c o n f i g u r a t i o n a n d to BYO D. I n s te a d o f a o n e - s i z e -f i t s - a l l security controls is the stuff of sleepless nights. approach, IT managers can choose an Smartphones are a common target for malware MDM tool that’s designed for BYOD, with and present a potential vector for intrusion privacy protections to satisf y the employee when connected to an organization’s network. a n d s t r o n g s e c u r i t y c o n t r o l s to s a t i s f y t h e n e e d s o f g o o d I T securit y. Without any visibility or control of the endpoints, good IT security is an impossible task. The need Simpler is better for security is what pushed many organizations A simple approach to managing devices in a to u s e M D M f o r t h e i r BYO D p r o g r a m , a n d r e q u i r e e m p l o y e e s to e n r o l l t h e i r p e r s o n a l device to gain access to the internal network, m a i l, c a l e n d a r s, a n d V PN. BYOD environment helps IT and the user be more successful. Unnecessary complexities such as dual personas or segmented data containers change the native user experience on the device—of ten for the worse—and BYOD, without unnecessar y complexities inhibits user adoption. MDM tools that are and added costs. This approach still gives sold as the solution to BYOD security may IT all necessar y securit y controls, and end up driving users away due to this p r ote c t s t h e u s e r ’s p e r s o n a l d e v i c e by overburdensome complexity. Once users a l l ow i n g t h e m to s e e ex a c t l y w h a t t h e opt-out of device management, IT security I T a d m i n c a n a n d c a n n ot d o. becomes an impossible task. Example BYOD management controls T he alternative is a tool that is designed IT admin can: for BYOD management and eliminates the • L ock the device and remove a passcode complexit y of one-size-f its-all MDM. T his • A pply institutional configurations, like Wi-Fi, preferred method does not require multiple VPN, mail, and passcode requirements tools or apps to enforce corporate policies, • I nsta ll a nd re move insti tu tio n a l a pps and the data used by those apps and eliminates distractions and unnecessary steps both for IT admins and users. The goal for a successful BYOD program is safe, secure IT admin cannot: • E rase private data like photos, personal m a il, o r c o ntac ts access to corporate resources—not additional hindrance and complexit y. • R emove any personal apps • V iew any private data including the n a m e s of p e r s o n a l a p p s MDM for BYOD • R estrict the usage of the device or limit To satisf y this need, leading organizations the personal apps that can be installed choose a feature set built specifically for Conclusion A successful BYOD program is a benefit to employees and IT admins alike. Users get easy access to critical resources like mail and calendars without sacrificing personal privacy, and IT admins can preser ve good IT security with personally owned devices. With the right MDM solution, IT can concentrate on addressing critical enterprise needs without friction from the technology itself or from users. And users receive comfort and familiarity with their own device without intrusive IT involvement. Visit jamfsoftware.com/byod to learn about the Casper Suite BYOD solution. info@jamfsoftware.com | 612.605.6625 | www.jamfsoftware.com ©2014 JAMF Software, LLC. All rights reserved.
© Copyright 2024