ENDPOINTS Deploy the BYOD trend in your company in a smart and safe way
What BYOD stands for?
Bring Your Own Device – BYOD – is a term that specifies the use of private devices for business purposes, within the company network as well as outside it.
The proper response to BYOD is definitely influencing the increase of the mobile workforce productivity, enhancing employees to be online for most of the day, being able to check the business emails more often, also after business hours. Allowing your people to use their own device with their own apps also increases the work satisfaction.
Using portable devices for work tasks saves employees 58 minutes per day while increasing productivity by 34%
61% of Gen Y and 50% of 30+ workers believe the tech tools they use in their personal lives are more effective and productive than those used in their work life (Dell)
There are many benefits of BYOD, but it also carries many risks related to the broadly understood security of IT infrastructure. That is why it is quite a challenge for IT departments, which are forced to introduce additional functionalities, changes in security policies, requirements for passwords or require remote access to our device.
Whereas organizations are aware of protecting servers and data centers they still seem to ignore the importance of endpoint environment protection. Endpoints are able to carry lots of key corporate data, such as contacts, confidential documents, e-mails and more. Unfortunately such devices are more likely to be stolen or damaged and they are more susceptible to ransomware attacks or data leakage. Therefore, it is mandatory to protect company data that is stored and processed on these devices.
Companies favouring BYOD make an annual saving of $350 per year, per employee (Cisco)
Understanding the BYOD trend
This trend requires extreme caution in terms of data safety as the users keep the private and corporate data on the same device. Things to remember:
- privacy becomes a problem in managing the BYOD security policy
- who is responsible for the company data that is on these devices?
- monitoring, encryption or deletion of data (here we mean private data) may lead to violating or threatening the privacy of the employee
Storware KODO provides secure data containers, which simply separate the sensitive corporate data from the private content on personal device of an employee. In fact, data containers act as the storage area that is authenticated, encrypted and managed by organization’s data protection policy provided by Storware KODO.
Krzysztof (Chris) Rocki, Senior Regional Manager CEE Red Hat Poland
Brett Whittacre, CEO
Robert Borys, IT Department Director
Mirosław Piechota, Director of the IT Department
Richard Palonen, Systems Specialist