Feeds

Danger, Will Robinson! Beware the hidden perils of BYOD

And we're so nice, we're telling you how to dodge them

Secure remote control for conventional and virtual desktops

Managing all these mobiles

Expanding the concept outside a single vendor, we now step into the world of mobile device management (MDM). The idea is simple: make every other type of smartphone controllable in the way that made BlackBerry so attractive.

management BYOD4

BYOD: great for working on the move, less so for security

It is no surprise that the range of offerings on the market is already big and it continues to expand as new vendors jump on the bandwagon.

Neither is it any great shock that the latest version of RIM's enterprise server package is multi-platform and encompasses iOS and Android devices as well as the company's proprietary handsets.

What does MDM bring us? Precisely what we have just discussed: centralised policies, mobile device wiping, control over the functions users are able to use, connectivity into corporate fileshares and so on.

Pretty well every decent offering has a similar baseline of functionality, including all of the above plus on-board encryption, the ability to share files securely with colleagues and third parties, and even the option not to permit the user to see files at all in the event that the device can't contact its “mother”.

There is just one snag, though: BYOD, or bring your own device.

It's personal

Some bright spark has decided it is a good idea to let users bring their own computers in to work and read their corporate emails on their own iPhones. Many employers (mine included) even offer financial incentives for staff to use their own devices to reduce the capital and support costs of owning vast collections of PC software.

Your users probably won't want you to wipe all their data just because they have left the company

This messes up the MDM model because your users probably won't want you to be able to take control of their devices, enforce policies or wipe all their data just because they have left the company and you don't want them to see their email any more.

The problem, then, is data leakage – regardless of whether staff members are part of some formal BYOD scheme or just using their personal device to make that last-minute tweak to a document. When data finds its way onto someone's portable device you can assume it will be accessible for ever more unless there is some way you can control what that person can do with it.

There are a few solutions and you may well end up using more than one of them, because each addresses a different aspect of the problem.

Application complications

If you install applications on users' mobile devices you have the problem of uninstalling them if users leave the company. The answer is simple: don't install them locally on the devices but instead make them accessible remotely.

Anyone who has ever used something like the Citrix Receiver client on an iPad will know that it is actually not a bad experience. True, you wouldn't want to write a novel on it, but you probably wouldn't want to do that on a locally installed word processor either.

The prevalence of 3G/4G mobile networks and wireless hotspots makes it economical for your users to treat their BYOD devices as thin clients and access applications over the internet.

This could be through a self-hosted or a cloud service, the latter often being preferable as users may well be connected automatically to their closest server, thus aiding performance.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.