BRING YOUR OWN DEVICE: AN ANALYSISVery few years ago, the businesses world has been witness of mobile technologies’ incursion in the workplace. Although all the security concerns, this technology is still deemed pervasive nowadays. There even talks of consumerization era purely and simply. BYOD, the most prominent is redefining the existing IT Infrastructure model BRING YOUR OWN DEVICE: AN ANALYSIS Bring Your Own Device: a Mid-Term Analysis of Opportunities and Security Challenges Very few years ago, the businesses world has been witness of mobile technologies’ incursion in the workplace. Although all the security concerns, this technology is still deemed pervasive nowadays. There even talks of consumerization era purely and simply. BYOD, the most prominent is redefining the existing IT Infrastructure model. To properly leverage this redesign of the IT Infrastructure paradigm, we recommend that the touched corporations should implement mobile device management strategy. By doing so, they will take advantage of employees’ satisfaction and productivity, will anticipate the new threats brought by this technology, and will reduce operational costs. Among all the resources involving in the production process, the human factor is uncontestable the most preponderated and pernicious. However, the recent trends forecast a significant reversal. The employees are expected to be morphed, because they keep in mind that using friendly customized device is more efficient and comfortable than the traditional working equipment. Their productivity has to be comprehended considering the pleasure principle from Sigmund Freud. Human, being satisfied doing the way they have perceived being the most comfortable and convenient are still more productive than ever. Such a mental state results in motivated employees who are active all the working hours and even thereafter regardless the decrepitude of their own devices used for the organizational purposes. In such a fashion, the companies might easily exploit that by allowing merely “any device anywhere”. The fact that, the employees use mobile devices for private and organizational purposes poses tremendous security problems. Given that mobile devices suffer of lack in terms of security measures to ensure data’s confidentiality and integrity while they are processing them. Consequently, the consideration of mobile device management must lead the enterprise to the development of security policies that reflect the information security management strategy used currently. This approach is also aiming to enforce the authentication measures. To do so, some even think that IT department might come up with such method that could enable remote wipe process for deleting enterprise local stored data. Doing so, disclosure and unauthorized access to enterprise’s data will be drastically mitigated. Suppose that increasingly the enterprise invests less in maintenance and replacement expenditures due to implementation of BYOD approach. Logically the enterprise’s productivity and efficiency are accrued. This reduction of operational costs makes the enterprise more competitive and it can attempt to take a wider market-share. This is where BYOD is going day by day. Certes, the enterprise has to invest in the application delivery, but this will be strictly matter of research and development. In order words, the enterprise cuts down operational budget and profits from allowing BYOD approach. The businesses world evolves rapidly. Many emerging technologies have changed the way that business works before. This is BYOD’s time, the corporations have to consider the MDM to quickly adjust their network and leverage the benefits of this promising technology. Many developments are required to afford it effectively: new policies, secure remotely access to sensitive data, and so forth. The corporate boundaries are extended without adequate measures instead of more earnings, the corporation might fall. So the future belongs to those that are capable to jugulate those challenges. Rubrique: TIC Auteur: Moise Edner Brutus | Date: 22 Avril 2016 |
|