Home > Security & Compliance > BYOD: Complications and Solutions
BYOD: Complications and Solutions

BYOD: Complications and Solutions

BYOD is a hot topic these days.  Allowing employees to bring their own devices to the corporate network has presented companies with numerous benefits and new management challenges.

We’ve seen an increase in the penetration of OSX based machines in the workplace, while other platforms, such as blackberry devices, have given way to android and iOS. IT teams are less burdened by having to refresh corporate desktops and laptops, but are now faced with supporting multiple mobile platforms and employee owned machines, and the security and information management concerns that accompany those devices.

A number of solutions have gained popularity to address corporate compliance, but vary in complexity, ease of implementation, and benefits.

VPN clients are easy to setup and manage, and provide endpoint to endpoint encryption.  They don’t however, provide any device level encryption, which leaves data freely accessible in the event of device theft. They also allow users to copy data to / from servers, making it difficult to control the access and dissemination of sensitive data.

Many organizations have begun to deploy secure container software on mobile devices.  These containers separate personal and corporate data on the device, while provided encrypted connections between the endpoints. Some vendors enable the ability to track the location of the device and perform a remote wipe if needed. Secure containers have become popular for phones and other mobile devices, but raise end user privacy concerns. Users are apprehensive to install software that can allow their company to monitor and track their location or perform a wipe of their personal devices.

Finally, we are seeing Desktop as a Service (DaaS) / Virtual Desktops (VDI) and Application Delivery as a Service.  Both of these options allow centralized management of desktop and application policies. Administrators are able to enable and disable user access quickly, while keeping corporate data stored in one location. Users are able to access their desktops or data from anywhere, and no corporate data resides on the local device.

Day to day administrative tasks are also reduced through the use of desktop and application templates. Users see common versions of applications, and upgrades are performed at a single location, rather than having to touch and upgrade every user device.

DaaS and VDI are best delivered via the Private Cloud.  The Private Cloud gives you dedicated resources, centralized management, and the security to manage user and administrator access. For added security, EarthLink can connect our Private Cloud resources to our private, nationwide EarthLink MPLS network.  Our DataCenter Firewall is part of that service as well, providing customizable Intrusion Prevention and Detection Services and reporting.

Register for our December 11th webinar, “Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprise”

About EarthLink Blogger

EarthLink Blogger
For more than 20 years, EarthLink has revolved around how to efficiently connect our customers with technology. Today, we are committed to making our customers’ customers happy with the technology foundation that underpins an exceptional experience. We have numerous industry and technology experts on staff at EarthLink, and each not only has extensive knowledge and experience in their field of expertise, but also a passion for ensuring EarthLink remains true to that commitment. They also enjoy sharing insights into the latest technology innovations in the hopes of informing and helping to reduce the burden on IT professionals.