BYOD 2.0 beyond mobile device management

As demand from employees to use their own devices grows, companies are getting a better understanding of BYOD, writes Nicolas Benisti, Senior Manager, Regional Marketing Southern EMEA F5

Tags: Bring Your Own Device (BYOD)F5 Networks
  • E-Mail
BYOD 2.0 beyond mobile device management Benesti: Organisations are ready for BYOD 2.0.
By  Nicolas Benesti Published  June 9, 2013

As demand from employees to use their own devices grows, companies are getting a better understanding of BYOD, writes Nicolas Benisti, Senior Manager, Regional Marketing Southern EMEA F5.

While it seems like the industry has been talking about it for years, a recent report by Forrester warned that BYOD uptake has only just begun. It’s true that corporates started discussing the concept back in 2007 when business executives began demanding access to corporate resources on their shiny new iPhones. But Forrester says that mobile information workers – workers with three or more devices, working from multiple locations, with many apps - has gone from 23% of all information workers — those who work on a computer for at least one hour per day —  to 29% in 2013, and is set to continue to grow with more tablet devices and more apps.

Forrester is right in that it is only now that large numbers of organisations are starting to implement BYOD initiatives. This increase is largely driven by the rise of cloud apps we can access on our mobile devices, and the influence they’re having on the way we work.

The appeal of BYOD is obvious. Allowing employees to access their data on personal devices, from any location at any time, provides a number of benefits; they have greater flexibility and are able to work more efficiently, as well as gleaning more satisfaction from their jobs. On the flipside – and the concern that has held many businesses back – is the numerous security issues it raises as employees demand access to sensitive corporate data on unmanaged and potentially unsecured devices.

In the early days of BYOD, (what we describe at F5 as BYOD 1.0), organisations tried to solve BYOD security issues in the workplace by managing employees’ devices as a whole (MDM: Mobile Device Management). But MDM is not without its drawbacks. Employees don’t like giving their companies control over their devices as they often contain personal applications and information. If an exec decides to leave a company, wiping her mobile may mean losing all enterprise data along with photos of her family. IT departments don’t like this scenario either; having to manage an employee’s entire device means their personal traffic becomes an IT problem.

In addition, not all employees are security-savvy, so they aren’t necessarily very good at taking the necessary measures to protect their devices, which could leave sensitive data vulnerable to attack. If the IT department needs to make any upgrades to an employee’s smartphone, they would also have access to his or her personal data, including phone numbers, family photos and social calendars.

As we enter BYOD 2.0, which Forrester indicates is the true beginning of the mobile working revolution, these issues are finally being addressed. MDM is over and Mobile Application Management (MAM) is set to take its place. The enterprise footprint on a personally owned device is now limited to the enterprise data and applications and nothing more. Device level Virtual Private Networks (VPNs) are now being replaced by application-specific VPNs, meaning that security measures like encryption can be implemented on individual applications, such as Microsoft Exchange, ensuring that employees’ work emails are secure but that they won’t get locked out of other applications if they forget their email encryption password.

What we are starting to see is technology that securely extends the enterprise to personal mobile devices. This builds on the BYOD 1.0 foundation, but the emphasis has now moved from management of the device to management of the application. Knowing that the IT department is managing applications rather than their entire device, employees can feel safe in the knowledge that their personal data is kept private and that they have control over their own devices. IT departments are happy because they now only need to concern themselves with the control, management and security of enterprise data and applications, rather than personal content.

By combining mobile management functionality and access functionality into a simple offering, enterprises achieve a mobile IT solution that extends from data and applications on the endpoint into the cloud and data centre. Different types of environments will require different levels of access control but this will not be to the detriment of the end user; phase two of BYOD means data is more secure but is as fast and available as before to provide an enhanced user experience.

Executives have been quick to embrace the BYOD trend and now that their concerns over enterprise management of their personal data should be a thing of the past, it’ll be interesting to see just how far the trend goes.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code