by Jim Haviland, Chief Marketing Officer for Vox Mobile and General Manager of Vox Strat

BYOD is a phrase we have all heard a million times, as it has been steadily gaining for companies of all types and sizes. Enterprise mobility is the trend of the decade, and when you couple the mobility movement with consumer-owned devices, things get even more interesting. As companies worldwide see increased pressure to allow employees to use their own devices for work, more and more are looking to formal programs to make this work with internal systems and security protocols.

Vox Mobile has been working with companies on BYOD programs for the past six years. The early adopters were doctors and real estate agents, and now major multi-national corporations are looking to it. In 2013 we’ll see an explosion of these kinds of programs. The gains in efficiency and cost-savings will be impressive.

For any company that wants to deploy BYOD, there is a recipe to follow for great success. A fully developed mobility program needs to consider:

User segmentation. Companies need to define needs and usage patterns, locations of use and business requirements.  This segmentation may include job criticality, time sensitivity, value derived from mobility, data and systems access needed, and application usage.

Technology alignment and device choice. Once you understand what, how and where employees will use their devices, you need to map the technology available to the need. This includes everything from evaluating the end-user device, applications, device management software and security protocols.  This technology portfolio is a living set of standards that may change several times each year to maintain alignment with the application roadmap, device evolution, end-user segment needs as well as changes in the security context or a maturing of the definition of wants and needs based on new experiences..

Policies. For an effective program strong guidelines must be put in place. From best practices to security and systems authorization, this will be key.  In developing policies it is important to keep in mind the systems will each user segment be allowed to access, the method of access, and at what times and from where.  Also, where corporate data will reside and data loss prevention, corporate or Individual liability, financial responsibility and processes for handling equipment and service transactions, risk mitigation and MDM deployment on the end user’s device, and compliance with country, state and local laws.

Security. Companies need to address this from the beginning. Considerations include:

Asset and identity management

Local storage  and removable media controls

Network access levels

Network application controls

Corporate versus personal application controls

Permissions and authentication

Password settings

Move, add and change management

Device health management

Unauthorized usage alerts

Data loss prevention

Support.  When the program is deployed, how will you support employees when something goes wrong? Having a well-thought out 24/7 infrastructure is key. Otherwise IT will spend time troubleshooting small issues rather than on strategic projects.

BYOD programs can be a great opportunity for many companies, offering cost-savings and efficiency gains. If you have been considering it, 2013 may be the year to take the plunge.

 

About the Author:

Jim Haviland – Chief Marketing Officer , Vox Mobile and General Manager, Vox Strat

Jim is an accomplished entrepreneurial executive with start-up, turn-around, and merger experience and proven strengths applying engineering discipline, business acumen, and agile methodology to improve the quality and efficiency of projects and operations. Mr. Haviland’s 15 years in technical and management consulting includes engagements with innovators such as Microsoft, Amazon, Baker Hughes, Principal Financial Group as well as a successful stint as the Vice President of Consulting Services for MCPc, Inc. during which time he led the mobility practice that eventually became Vox Mobile.

Jim earned his BS in Electrical Engineering from the University of Michigan and completed a certificate in Entrepreneurship from The Wharton School of the University of Pennsylvania.

 

270 queries. 2.966 seconds.