BYOD: ADAPTING TO AN INCREASINGLY MOBILE WORLD

For decades, companies knew exactly which tools their employees would be using to get their work done. The IT department assigned them a desktop PC for the office, and perhaps a laptop and mobile device for use at home or on the road. The company, through its IT department, dictated what software would run on the device, and retained an administrator password so they would always be in control. Those days are over. Employees have their own personal devices (laptops, tablets and smartphones), and those devices are often more powerful and easier to use than what the company has assigned them. They now expect and increasingly demand the  freedom to use their perso al devices for work, accessing the company network to perform their daily tasks. And employees and users are extremely resourceful – if new technology can help them do their job better, they’ll use it, even if it’s under the radar. Rather than fight the inevitable, more and more organizations are allowing employees to use their personal devices for work so they can be as productive as possible, rather than throwing obstacles in their way. As companies transition to a BYOD environment, IT departments have to make some major adjustments along the way. Rather than

managing a small, predictable set of devices and configurations, BYOD is a complex and dynamic landscape, with many different models of laptops, tablets, and smartphones, some running Windows; but most using iOS, Android, or some other operating system. They’re used by many different categories of employees as well as guests – partners, contractors, job candidates, interns and others – all expecting access to your network, or at least a portion of it. Traditional, one-size-fits-all command-and-control device management won’t work in this dynamic environment. But how are you going to identify, onboard and manage all of these different personal devices and types of users? At the same time, you have to prevent unauthorized access and other security risks (including cyber criminals preying on unsuspecting users in order to slip through the company firewall).