Skip to main content

This post is from the Apperian blog and has not been updated since the original publish date.

Last Updated Jan 14, 2013 — App Management expert

5 Key Considerations When Deploying a BYOD Program

App Management
Nowadays, employees expect unfettered access to corporate data. In fact, 68% of employees are already using their personal devices for work, according to a recent survey by Globo. While there are many benefits to a "Bring Your Own Device" friendly workplace, such as increased productivity and lower expenses, companies need to think carefully when crafting their own BYOD programs.
  1. Data Security: This is an important issue, especially to those in highly regulated industries such as healthcare and financial services. Data must be protected in multiple situations: on-device, in-transit between network and device, within the application, across different user profiles, and when an employee leaves the company or loses the device. These varying use cases require different approaches to data security, such as encryption, authentication, containerization, virtualization, mobile device management and mobile application management.
  2. Employee Privacy: Companies don’t want to be responsible for deleting an employee’s wedding photos, and employees expect that their personal activities will not be monitored. Furthermore, employees assume that the user experience will remain unchanged (no barriers to accessing Facebook, lockdown on installation of new apps, or heavy security routines, which impact device performance). This drives the need for companies to consider managing security at the application rather than the device level.
  3. Network Protection: Consumer devices are inherently insecure, leaving a lot of risk on the table. How do you prevent malware threats from infected third party apps? And how do you keep jailbroken phones from corrupting your network? What about public Wi-Fi connections? Are you going to force your employees to suffer through a slow VPN connection whenever they’re working at a coffee shop on a Saturday? Or will you enable a secure way for workers to directly access your network?
  4. Application Delivery: How will users access applications? With employees accustomed to the instant download capability of app stores, old-school restrictive installation policies won’t go over well. Are you going to ban employees from using their favorite productivity apps such as Dropbox and Skydrive or will you find a way to secure them?
  5. Financial Implications: Your analysis is not complete without considering the financial impact of BYOD. To what extent are you willing to reimburse your employees for their service plans? What is IT’s role in supporting BYOD devices? How will you measure success?
The answers to these questions are different for every company, but fortunately there are many tools to assist companies in managing mobile apps. With the right policies in place, any company can launch a successful BYOD program.    

More from the Blog

View more
Apr 30, 2020

Mobile Application Management: A Forward View

App Management
  IT Is Adapting in the Midst of the COVID-19 Pandemic The Coron ...
Read More
May 19, 2019

Sneak Peek: How Are IT Leaders Driving Mobile App Adoption?

App Management
Apperian conducted the The Mobile Enterprise Application Survey to fin ...
Read More
Jan 30, 2019

Part 1: App Security Should Be an Integral Part of Your DevSecOps Process — Not an Afterthought

Application Security
What are the key considerations and components of DevSecOps? The in ...
Read More
Nov 19, 2018

Breaking Down the New California IoT Law

Application Security
Recently California passed legislation regarding the security of all I ...
Read More
Contact Us