Docstoc

Challenges & Benefits of BYOD Access

Document Sample
Challenges & Benefits of BYOD Access Powered By Docstoc
					Challenges & Benefits of BYOD Access
The trend of personal smart phones gaining popularity is making an impact on the office environment.
 The consumerisation offers employees with better device choices and flexibility in where they work but
in the process it is taking away control from IT teams. For IT, this consumerisation has left the work
station without any regard for IT’s role. Furthermore, recent studies have indicated that almost 73
percent of enterprises have non-IT managed devices accessing corporate resources, what is known as
BYOD (Bring Your Own Device) culture. This has resulted in a fracture in IT safety policy and network
expenses. This is because IT generally cannot rely on a policy that tends to utilize the PC security model
effectively in a tablet and Smartphone platform. Hence, a comprehensive enterprise mobility strategy
needs to be implemented.

It has been observed that only 30 percent of UK IT teams have been integrating Smartphone’s and tablet
access management practices since 2012. The collection of devices making their way to the enterprises
along with the absence of a proper enterprise mobility strategy, is leading several IT departments into
trouble. Their presence on an enterprise’s network without the apt tools for assistance increases the
expenses and the chances for data loss and non-compliance. Therefore, when implemented correctly, a
proactive enterprise strategy that includes a BYOD plan can help to enhance device security, flexibility
and compliance.

However, the challenges that remain in implementing BYOD are:

       Helping fostering the bring your own device (BYOD) concept and allowing the workers to utilize
        their personal smart phones, tablets, laptops and PCs to work
       Offering access to business applications from personal devices without making the corporate
        network exposed and the risk of data leakage
       Making the existing enterprise applications accessible on mobile devices to address the absence
        of native mobile applications for business
       Offering workers the freedom of choice in choosing the mobile device for business
       Implementing a BYOD strategy cost-efficiently

Keeping in mind all these aspects service providers specializing in remote desktop access, load balancers
and SSL VPN has come up with advanced BYOD solutions that helps employees to access virtual or
physical office desktops and applications from any device or locations. Regardless of the user being
online from their desktop, laptops, a partner site, or from an iPad, iPhone or Android device they are
able to carry on with their work seamlessly. The software is installed on the corporate network and it
integrates with the present identity management solutions to set up user credentials. The virtual or
physical office desktops and applications are registered for mobile and remote access either by the IT,
users or through a database.

Related Links - Load Balancing

				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:15
posted:2/13/2013
language:English
pages:1
Description: Load balancing which is defined by Wikipedia as “a computer networking method to distribute workload across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid overload.