When it comes to BYOD…Tread Lightly

When it comes to implementing a BYOD strategy, IT decision makers may be fearful of the potential security risks that are involved. On the other hand, some businesses have jumped the gun and rolled out a BYOD plan while failing to incorporate proper policies for their staff. As a matter of fact, according to a Dell info graphic, 80% of BYOD use is totally unmanaged.

So is there a happy medium between diving right and completely opting out? With 20% of BYOD programs predicted to fail by 2016, it would be highly beneficial for your organization to take a cautious approach.

There are many obstacles to overcome prior to launching a BYOD friendly workplace. Finding out where to begin is certainly considered a top that list. Here are few tips that you can apply to help you get started!

 1. Network Preparation

Congratulations! You have decided to take the first steps towards implementing a BYOD program within you organization. Once IT decision makers and business owners meet an agreement to allow employee owned devices into the workplace, the steps following that decision can be a bit unclear. While some will rush to begin writing the new policies, it’s better to begin with a network assessment to identify the state of your current infrastructure.

2. Consider Your Wireless Options

OK so the assessment is complete, now what? In some cases your analysis may show areas within your WLAN that may need to be upgraded prior to your BYOD deployment. Connectivity is key for mobile workers so it is important to have the fastest, most secure and efficient Wi-Fi available to support the number of devices connecting to the network. Satisfying the expectations of your employees has never been more significant and that is why I’m in full support of the newest IEEE standard in 802.11ac

802.11ac is the newest wireless networking standard in the 802.11 family. Also known as Gigabit Wi-Fi, 802.11ac improves upon the features and benefits of the popular 802.11n which is the common standard for many of today’s mobile devices. With increased speeds and capacity 802.11ac proves to be ready to take on the invasion of next generation technology.

3. Manage Your Devices

There are many challenges when facing a BYOD deployment. One of the biggest is increased security risks from employee-owned devices. Mobile Device Management (MDM) software gives you the ability to manage, monitor, and secure employee device activity across your network. An MDM solution provides your IT department with a strong comfort level by giving them the ability to easily enforce and customize their BYOD policies from a comprehensive platform. Gartner states that over the next 5 years, 65 % of enterprises will adopt a mobile device management solution for their corporate liable users.

4. Outlining Your Policies

Now that we have acknowledged the proper tools to manage these devices, you should now begin to outline your BYOD policies. This will also help gauge how an MDM solution can be beneficial for your deployment. While creating a BYOD management checklist you should start with focusing on solutions for network access control, guest user access, content management, and mobile application management.

Have you considered migrating towards a BYOD environment? We would love to hear from you. TTI succeeds beyond expectations to satisfy their customer’s needs beginning with an initial introductory phone call, a free network assessment and consultation, and an assessment analysis review. Contact one of our certified experts today and schedule a complimentary assessment.

By Tony Ridzyowski

05.19.2014

Sign up for the TTI Newsletter