BRING YOUR OWN DEVICE: AN ANALYSISde Moise Edner Brutus| JobPaw.com

BRING YOUR OWN DEVICE: AN ANALYSIS


Very few years ago, the businesses world has been witness of mobile technologies’
incursion in the workplace. Although all the security concerns, this technology is still deemed
pervasive nowadays. There even talks of consumerization era purely and simply. BYOD, the
most prominent is redefining the existing IT Infrastructure model
BRING YOUR OWN DEVICE: AN ANALYSIS
Bring Your Own Device: a Mid-Term Analysis of Opportunities and Security Challenges
Very few years ago, the businesses world has been witness of mobile technologies’
incursion in the workplace. Although all the security concerns, this technology is still deemed
pervasive nowadays. There even talks of consumerization era purely and simply. BYOD, the
most prominent is redefining the existing IT Infrastructure model. To properly leverage this
redesign of the IT Infrastructure paradigm, we recommend that the touched corporations should
implement mobile device management strategy. By doing so, they will take advantage of
employees’ satisfaction and productivity, will anticipate the new threats brought by this
technology, and will reduce operational costs.
Among all the resources involving in the production process, the human factor is
uncontestable the most preponderated and pernicious. However, the recent trends forecast a
significant reversal. The employees are expected to be morphed, because they keep in mind that
using friendly customized device is more efficient and comfortable than the traditional working
equipment. Their productivity has to be comprehended considering the pleasure principle from
Sigmund Freud. Human, being satisfied doing the way they have perceived being the most
comfortable and convenient are still more productive than ever. Such a mental state results in
motivated employees who are active all the working hours and even thereafter regardless the
decrepitude of their own devices used for the organizational purposes. In such a fashion, the
companies might easily exploit that by allowing merely “any device anywhere”.
The fact that, the employees use mobile devices for private and organizational purposes
poses tremendous security problems. Given that mobile devices suffer of lack in terms of
security measures to ensure data’s confidentiality and integrity while they are processing them.
Consequently, the consideration of mobile device management must lead the enterprise to the
development of security policies that reflect the information security management strategy used
currently. This approach is also aiming to enforce the authentication measures. To do so, some
even think that IT department might come up with such method that could enable remote wipe
process for deleting enterprise local stored data. Doing so, disclosure and unauthorized access to
enterprise’s data will be drastically mitigated.
Suppose that increasingly the enterprise invests less in maintenance and replacement
expenditures due to implementation of BYOD approach. Logically the enterprise’s productivity
and efficiency are accrued. This reduction of operational costs makes the enterprise more
competitive and it can attempt to take a wider market-share. This is where BYOD is going day
by day. Certes, the enterprise has to invest in the application delivery, but this will be strictly
matter of research and development. In order words, the enterprise cuts down operational budget
and profits from allowing BYOD approach.
The businesses world evolves rapidly. Many emerging technologies have changed the
way that business works before. This is BYOD’s time, the corporations have to consider the
MDM to quickly adjust their network and leverage the benefits of this promising technology.
Many developments are required to afford it effectively: new policies, secure remotely access to
sensitive data, and so forth. The corporate boundaries are extended without adequate measures
instead of more earnings, the corporation might fall. So the future belongs to those that are
capable to jugulate those challenges.
Rubrique: TIC
Auteur: Moise Edner Brutus | moiseednerb@yahoo.fr
Date: 22 Avril 2016
Liste complète des mémoires et travaux de recherche