IT Security Can Look Like a Hero If It Leads the Charge to Establish Enterprise BYOD Policies

Report this content

IT Connection Blog by Paula Musich

Summary Bullets:

  • IT security groups should be proactive in establishing policies that govern the use of employee smartphones and tablets in the enterprise to improve their reputation as productivity enablers, rather than stumbling blocks.
  • Key considerations include what devices to allow, how corporate data and apps will be accessed, where data will reside, and what the users’ risk profiles are.

Some recent surveys suggest that while many enterprises are now allowing employees to use their own devices to access corporate networks and applications, few have established formal usage policies for those BYOD users.  One study published last month by security awareness training company KnowBe4 found that 71% of businesses allowing employees to use their own smartphones and laptops for work-related tasks did not have usage policies and processes in place to secure and support those devices.  This is the perfect opening for enterprise security and IT risk groups to seize the day and take a leadership role in defining the enterprise’s BYOD policy, setting themselves up as enablers, rather than roadblocks to improved employee productivity.  Read more of this post at http://bit.ly/T4KNXO

Media Contact:

Amee Singh
Sr. Director, Marketing Communications
pr@currentanalysis.com 

About IT Connection

IT Connection is the premier source of unbiased analysis and assessments of IT equipment and telecom services.  IT Connection provides easy-to-access, cost-effective, non-vendor-sponsored research to enterprise IT professionals.  The assessments on IT Connection allow you to quickly, easily, and efficiently assess suppliers, access side-by-side product comparisons, determine the best technology solution to fit your needs, and receive real-time updates and analysis on breaking market-changing events.  To join our community and interact with your peers and our analysts, visit us at www.currentanalysis.com/ITC.

About Current Analysis

Current Analysis (http://www.currentanalysis.com) has been helping leading telecommunications, information technology and business software companies improve their competitive intelligence, differentiate themselves in the market, and win more business. Current Analysis is the only provider of continuous, in-depth tactical competitive intelligence, analysis, and advice. For more than 15 years, sales teams, product managers, marketing professionals, and executives have relied on Current Analysis as a trusted partner to improve their ability to anticipate and quickly take action on market opportunities and competitive threats. The company serves more than 35,000 professionals at over 1,600 global enterprises.

Tags:

Documents & Links

Quick facts

IT security groups should be proactive in establishing policies that govern the use of employee smartphones and tablets in the enterprise to improve their reputation as productivity enablers, rather than stumbling blocks.
Tweet this
Key considerations include what devices to allow, how corporate data and apps will be accessed, where data will reside, and what the users’ risk profiles are.
Tweet this