What is really happening with BYOD

Recent research showed that 8 out of 10 people use their personal smartphone for business related purposes. ‘Bring your own device;, BYOD, is rapidly becoming a new jargon. Social media and mail already seamlessly work with mobile. All research articles conclude with big and growing access percentages to the Internet from mobile. Mobile Internet is estimated to surpass fixed Internet somewhere in 2014. 

Everybody is writing about percentages, hours of extra work per employee and how IT departments struggle to keep track with developments. One thing is certain; Dutch companies are forced to think along and deploy some sort of strategy to accommodate BYOD within their businesses.

So, we all agree on the growing importance of smartphones? So, lets suppose you’re an IT manager of a company that has deployed several enterprise Apps already. Your colleagues use their own smartphone to access the company legacy systems You’ve embraced HMTL5 is platform for development. Common enough scenario!

In our view, considering all other variables under control (strategy, concept design, development), only security matters now. How do you make sure your communication is secure? What if a smartphone or tablet is stolen? What mobile login procedures do you deploy?

What we often see that for the transport layer, companies choose for implementation of the SSL security protocol in their App. All transactions will be done behind 128bit or 256bit SSL, nobody will be able to eavesdrop. As for logging in from mobile, methods vary from free access with only a first successful login to a full username/password/secret code procedure. It all depends on the importance of the data displayed in the App. And, last but not least, as there is a BYOD policy, or even the company distributes Androids among employees and even customers, some sort of Mobile Device Management tool is implemented. Most important feature: being able to remotely wipe your smartphone in case of theft, job change/termination or a lost and not found scenario. Second most important: being able to administer your App distribution in a neat and easy way.

Tags: Trends,