7월 5, 2016

A winning business with BYOD

Rick Segal

It is no surprise that the trend of Bring Your Own Device (BYOD) continues to trend favorably among businesses large and small. A properly executed BYOD strategy can save a company money, increase productivity, and increase employee job satisfaction. All of these benefits can be obtained without the loss of corporate security or an increase in the leakage of important company information. For the individual, a BYOD policy gives you extra flexibility in selecting the devices that best fit your particular needs.

In this article, I’ll take a look at some of what it takes to implement a BYOD program in your business. Done right, you avoid Bring Your Own Disasters!

 

Policies first

We often tell programmers not to touch the keyboard until they have planned out the code they are going to work on. In a BYOD plan, it is vital you lay out the policies for your company and access to your company information.

 

Who can access the network?

This is the most critical policy and it is not as simple as you might first think. A good access policy starts with the assumption that people don’t need access outside the office, then justifying each person or group you add. It is just super easy to say everybody which leads to problems down the road. 

By really justifying everyone and every group, you start with tight access before anybody has logged onto your network. For example, inside sales guys. When they leave the office, do you want them to have access to your sales database? Access to the CRM system? Do the developers need after hours/off campus access to core systems?

 

What can be accessed?

Everybody sending and receiving email is usually a safe bet. But is a general purpose Virtual Private Network (VPN) access for everybody the right way to go? You should audit your systems and decide which systems need external access and by whom. Then adjust your access systems (VPN, Remote PC, etc.) to match what you want to grant.

 

What devices can access the network?

Samsung’s latest flagship mobile phones, tablets, and two-in-one devices all give people amazing tools to accomplish business tasks. The key to good BYOD policies is to decide what devices are allowed onto the network and communicate that information to everyone. In some cases, questionable clone/cheap import devices will not have the built-in security features like Samsung’s Knox security platform. Ensuring that the devices themselves will protect you from malicious attacks or worse, is critical to a successful BYOD program.

 

Configuring for work/play

People using their own devices don’t want the boss looking at private/personal material on the device. This means that the company should have a strong way to have a managed area on the device that goes when the employee goes but doesn’t blow up the whole phone. Samsung Knox provides a container where work can stay in one, secure, encrypted location that can be managed by the company via an EMM partner such as AirWatch, MobileIron, SOTI, to name three. Using Samsung Knox or other product, both the company and employee can be sure data is separate and personal material is controlled only by the individual.

 

Audits, logs, and spot checks

It is critical that everybody, IT people, management, and the employees all agree to security policies about auditing devices, logging access, and spot checks for compliance. These issues get incrementally more important as the level of regulations are linked to you line of business.

 

As you can see, there are many issues surrounding the implementation of a solid BYOD program. Take the time to lay out all the issues, policies, and procedures in advance so your odds of success will be in your favor.

[아이콘] 닫기

삼성 Knox 시작하기

[아이콘] 여행가방
리셀러, 솔루션 공급업체 또는 서비스 공급업체이신가요?

지금 Knox 파트너가 되어 비즈니스 성장을 도모하세요.

[아이콘] 정보

시작할 Knox 제품 선택:

올인원 번들
Knox Suite
리브랜딩 및 맞춤 설정
Knox Configure
사기 및 도난 방지
Knox Guard
디바이스 보호 플랜
Samsung Care+ for Business
기타 제품 및 서비스

시작하기

[이미지] Knox Suite

기업용 모바일을 위한 일체형 솔루션 번들

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 회사 디바이스를 안전하게 보호, 배포, 관리 및 분석할 수 있는 완벽한 툴 모음입니다.
  • Knox Suite와 함께 제공되는 강력한 기능을 사용해 보세요.

Knox Suite에는 다음이 포함됩니다.:

Knox Mobile Enrollment 무료
Knox Manage
Knox E-FOTA
Knox Asset Intelligence
Knox Platform for Enterprise 무료
Knox Remote Support
Knox Capture
Knox Authentication Manager

시작하기

[이미지] Knox Configure 로고

삼성 디바이스를 리브랜딩하고 맞춤 설정하세요.

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 삼성 디바이스를 대량으로 구매하는 즉시 원격으로 구성하고 특정 요구 사항을 충족하도록 맞춤 구성합니다.
  • 디바이스를 일회성 배포를 위해 설정하거나 원하는 만큼 업데이트할 수 있습니다.

시작하기

[아이콘] Knox Guard 로고

삼성 디바이스를 위한 사기 및 도난 방지

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 원격으로 삼성 디바이스를 제어하여 금융 관련 위험성을 줄이고 자산을 보호하세요.
  • SIM 제어 및 디바이스 잠금 기능을 포함한 Knox Guard의 모든 기능을 사용해 보세요.

시작하기

[이미지] Samsung Care Plus For Business 로고

삼성 디바이스를 위한 디바이스 보호 플랜

  • 빠른 디바이스 수리 및 교체로 업무 중단을 최소화합니다. 시작하려면 삼성 영업팀에 문의하세요.
  • 한 곳에서 모든 디바이스 보증 범위 및 청구 정보를 확인하세요.
  • 이미 Samsung Care+ for Business를 구매하셨나요? Samsung Care+ for Business 콘솔에서 계정을 만들고 플랜을 활성화하세요.

기타 제품 및 서비스

[이미지] 기타 로고

고객의 고유한 요구 사항을 해결하는 최신 솔루션입니다.

  • Enterprise Tech Support를 통해 전담 계정 관리자로부터 효율적인 기술 지원을 받아보세요.
  • 삼성 소프트웨어 맞춤 설정 서비스를 사용하여 귀사를 위한 맞춤형 디바이스를 만들어 보십시오.
영업 팀에 문의