Thursday, February 28, 2013

When alien hardware invades: 4 keys to BYOD success

We all love our gadgets, but some of our favorite devices, however innocent they may appear, are poised to overwhelm IT departments worldwide.

Like it or not, the ?bring your own device,? or BYOD, trend is now a permanent fixture among businesses big and small. Sure, some companies still prohibit employees from integrating personal laptops, tablets, and smartphones into their IT infrastructures, but their numbers are quickly dwindling. BYOD is a matter of ?when? not ?if,? so businesses and IT admins must understand the risks involved and determine the most effective and secure ways to embrace all these alien gadgets.

When Paul Proctor, vice president and security analyst for Gartner, moderated a panel discussion on BYOD at the RSA Security conference in San Francisco this week, he classified four different approaches to BYOD: containerization, embrace, block, and ignore.

?Containerization? allows for BYOD but carves out a separate space for business-related data and communications. Meanwhile, companies that ?embrace? BYOD have a no-holds-barred, bring-it-on ethos when it comes to hardware and security management. ?Block? characterizes companies that actively ban BYOD, while ?ignore? describes organizations that pretend the issue doesn?t exist.

To read this article in full or to leave a comment, please click here

Source: http://www.pcworld.com/article/2029540/when-alien-hardware-invades-4-keys-to-byod-success.html

FAIR ISAAC FACTSET RESEARCH SYSTEMS F5 NETWORKS EPICOR SOFTWARE

No comments:

Post a Comment