{"id":10171,"date":"2012-07-03T14:24:43","date_gmt":"2012-07-03T18:24:43","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=10171"},"modified":"2021-07-04T15:00:26","modified_gmt":"2021-07-04T19:00:26","slug":"byod3","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/byod3\/","title":{"rendered":"BYOD Notes"},"content":{"rendered":"<h3>90% of Employees Use Personal Devices for Work<\/h3>\n<p><a href=\"http:\/\/web.archive.org\/web\/20120723071857\/http:\/\/xangati.com\/blog\/the-abcs-of-byod-part-three-criteria-for-change\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100708 \" title=\"90% of Employees Use Personal Devices for Work\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man.jpg?resize=99%2C119&#038;ssl=1\" alt=\"90% of Employees Use Personal Devices for Work\" width=\"99\" height=\"119\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man.jpg?resize=125%2C150&amp;ssl=1 125w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man.jpg?resize=62%2C75&amp;ssl=1 62w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_man.jpg?w=425&amp;ssl=1 425w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/><\/a>A <a title=\"New Research Reveals Growing 'Consumerization of IT' Trend Fueling Security Fears and Highlights Lack of Strategy to Manage Personal Devices\" href=\"http:\/\/web.archive.org\/web\/20121017043337\/https:\/\/www.kace.com\/resource-center\/resources\/Consumerization-of-IT-Survey-2011\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a> by <a title=\"KACE Networks\" href=\"http:\/\/www.kace.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">DELL Kace<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-DELL\/\" target=\"_blank\" rel=\"noopener noreferrer\">DELL<\/a>) found IT managers feel they lack the necessary tools to properly manage BTOD personal devices. In the study, IT managers revealed they are unable to effectively protect corporate data and intellectual property as well as ensure compliance. <em>Help Net Security<\/em> <a title=\"90% of employees use personal devices for work\" href=\"https:\/\/web.archive.org\/web\/20140427055438\/http:\/\/www.net-security.org\/secworld.php?id=11620\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> key survey findings include:<\/p>\n<ul>\n<li>87% of companies have employees that use a personal device for work including laptops, smartphones and <a title=\"Tablet computer\" href=\"http:\/\/en.wikipedia.org\/wiki\/Tablet_computer\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">tablet computers<\/a>.<\/li>\n<li>82% citing their concerns about the use of personal devices for business use<\/li>\n<li>64% revealed they are not confident that they know of all personal devices being used for business purposes<\/li>\n<li>62% specifically concerned about <a title=\"Network security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Network_security\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">network security<\/a> breaches<\/li>\n<li>60% reported a greater demand for support of <a title=\"Mac OS X\" href=\"http:\/\/www.apple.com\/macosx\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Mac OS X<\/a> since the introduction of the\u00a0<a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"iPad\" href=\"http:\/\/www.apple.com\/ipad\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPad<\/a> and <a title=\"iPhone\" href=\"http:\/\/www.apple.com\/iphone\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPhone<\/a><\/li>\n<li>59% reported their personal devices have created the need to support multiple operating systems (OS\u2019s).<\/li>\n<li>32% revealed employees use unauthorized personal devices and applications to connect to their network<\/li>\n<\/ul>\n<p>On the governance side:<\/p>\n<ul>\n<li>88% said they believe it is important to have a policy in place to support personal devices, and another 62 percent revealed their organization lacks the necessary tools to manage personal devices.<\/li>\n<\/ul>\n<p>\u201c<em>It\u2019s absolutely essential that IT teams deploy a strategy that provides end-to-end management capabilities on a variety of operating systems to effectively protect networks and address the consumerization and personalization of IT<\/em>,\u201d said <a title=\"Rob Meinhardt\" href=\"https:\/\/rmeinhardt.typepad.com\/about.html\" target=\"_blank\" rel=\"noopener noreferrer\">Rob Meinhardt<\/a>, general manager and co-founder for Dell KACE.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.businessagility.com\/author.asp?section_id=1671&amp;doc_id=243836&amp;f_src=businessagility_section_1671\" target=\"_blank\" rel=\"noopener noreferrer\">Mobility &amp; the Risks of BYOD<\/a> (businessagility.com)<\/li>\n<\/ul>\n<h3><a title=\"Security Monitoring for BYOD Environments\" href=\"https:\/\/web.archive.org\/web\/20120504070929\/http:\/\/net-security.org\/secworld.php?id=12805\" target=\"_blank\" rel=\"noopener noreferrer\">Security Monitoring for BYOD Environments<\/a><\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20191210030708\/http:\/\/www.cybertrackmarketing.com:80\/newpageSEO.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100710\" title=\"Security Monitoring for BYOD Environments\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_telescope.jpg?resize=100%2C142&#038;ssl=1\" alt=\"Security Monitoring for BYOD Environments\" width=\"100\" height=\"142\" \/><\/a>Unlike other BYOD security solutions that force organizations to install software on every new device, <a title=\"Lanscope\" href=\"http:\/\/www.lancope.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lancope&#8217;s<\/a> <a title=\"Lancope's StealthWatch System\" href=\"http:\/\/www.lancope.com\/products\/stealthwatch-system\/\" target=\"_blank\" rel=\"noopener noreferrer\">StealthWatch System<\/a> provides security for any device entering the network, without having to install more software on the device or deploy expensive probes. <em>Help Net Security<\/em> <a title=\"Security monitoring for BYOD environments\" href=\"https:\/\/web.archive.org\/web\/20120504070929\/http:\/\/net-security.org\/secworld.php?id=12805\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that StealthWatch performs behavioral analysis on flow data from existing infrastructure to deliver end-to-end visibility and security across an organization&#8217;s entire network.<\/p>\n<p><a title=\"Netflow\" href=\"https:\/\/web.archive.org\/web\/20140428112212\/http:\/\/www.netcraftsmen.net:80\/resources\/archived-articles\/458-netflow.html\" target=\"_blank\" rel=\"noopener noreferrer\">Net flow data<\/a> already exists in network infrastructure devices to monitor network and host activity. Since net flow is already in most <a title=\"Networking hardware\" href=\"http:\/\/en.wikipedia.org\/wiki\/Networking_hardware\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">network equipment<\/a>, it provides a cost-effective tool for monitoring mobile devices. The article says <a title=\"Netflow Monitoring\" href=\"http:\/\/www.manageengine.com\/products\/netflow\/netflow-monitoring.html\" target=\"_blank\" rel=\"noopener noreferrer\">flow-based monitoring<\/a> can uncover external attacks like <a title=\"botnet\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnets<\/a>, <a title=\"Malware worm\" href=\"https:\/\/web.archive.org\/web\/20181207103158\/http:\/\/malware.wikia.com\/wiki\/Worm\" target=\"_blank\" rel=\"noopener noreferrer\">worms<\/a>, <a title=\"Malware virus\" href=\"https:\/\/web.archive.org\/web\/20190216032801\/http:\/\/malware.wikia.com:80\/wiki\/Virus\" target=\"_blank\" rel=\"noopener noreferrer\">viruses<\/a> or APTs, as well as internal risks such as network misuse, policy violations and data leakage. It can also be leveraged for other efforts including regulatory compliance and capacity planning, and for ensuring high levels of network and <a title=\"Mobile device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile device<\/a> performance.<\/p>\n<p><strong>Related articles<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/venturebeat.com\/2012\/05\/05\/byod-fun-sponge\/\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD and the security fun-sponge<\/a><\/li>\n<\/ul>\n<h3><a title=\"IT is embracing BYOD\" href=\"https:\/\/web.archive.org\/web\/20120520110125\/http:\/\/www.net-security.org:80\/secworld.php?id=12942\" target=\"_blank\" rel=\"noopener noreferrer\">IT is Embracing BYOD<\/a><\/h3>\n<p><a href=\"http:\/\/tabtimes.com\/analysis\/ittech-tablets\/2012\/04\/28\/week-tablets-apples-amazing-ipad-sales-figures-and-scary-byod\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100712 \" title=\"IT is Embracing BYOD\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-tshirt1.jpg?resize=99%2C99&#038;ssl=1\" alt=\"IT is Embracing BYODIT is Embracing BYOD\" width=\"99\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-tshirt1.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-tshirt1.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod-tshirt1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/><\/a>Cisco says that IT is accepting, and in some cases embracing, &#8220;bring your own device&#8221; (BYOD). <em>Help Net Security<\/em> <a title=\"IT is embracing BYOD\" href=\"https:\/\/web.archive.org\/web\/20120520110125\/http:\/\/www.net-security.org:80\/secworld.php?id=12942\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the networking giant found that some of the pros and cons associated with allowing employees to use their own <a title=\"Mobile device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile devices<\/a> on their employers&#8217; networks has become a reality in the enterprise.<\/p>\n<p>The <a href=\"http:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-CSCO\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSCO<\/a>) study <em>BYOD and Virtualization<\/em> (<a title=\"BYOD and Virtualization\" href=\"http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/BYOD.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) found most enterprises are now enabling BYOD.<\/p>\n<ul>\n<li>95% of responding firms permit employee-owned devices in some way in the workplace.<\/li>\n<li>The average number of connected devices per <a title=\"Knowledge worker\" href=\"https:\/\/web.archive.org\/web\/20180401181836\/http:\/\/searchcrm.techtarget.com:80\/definition\/knowledge-worker\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">knowledge worker<\/a> will grow from 2.8 in 2012 to 3.3 by 2014.<\/li>\n<li>76% of IT leaders surveyed categorized BYOD as a positive for their companies and challenging for IT.<\/li>\n<\/ul>\n<p>The survey says employees are turning to <a title=\"BYOD\" href=\"https:\/\/web.archive.org\/web\/20150624063441\/http:\/\/searchconsumerization.techtarget.com:80\/definition\/BYOD-policy\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD<\/a> because they want more control of their work experience:<\/p>\n<ul>\n<li>40% of respondents cited &#8220;device choice&#8221; as employees&#8217; top BYOD priority (the ability to use their favorite device anywhere).<\/li>\n<li>Employees&#8217; second BYOD priority is the wish to do personal activities at work, and work activities during personal time.<\/li>\n<li>Staff wants to bring their own applications to work: 69% of respondents said that unapproved applications, especially social networks, cloud-based email, and instant messaging, are more prevalent today than two years ago.<\/li>\n<li>Employees are willing to invest to improve their work experience. Cisco employees pay an average of $600 out-of-pocket for devices that will give them more control over their work experience the report says.<\/li>\n<\/ul>\n<p>The article says these findings underscore that BYOD is here to stay, and managers are now acknowledging the need for a more holistic approach, one that is scalable and addresses mobility, security, virtualization, and network policy management, to keep management costs in line while simultaneously providing optimal experiences where savings can be realized.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20130106124111\/http:\/\/gigaom.com:80\/cloud\/ibm-stung-by-byod-pitfalls\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM stung by BYOD pitfalls<\/a> (gigaom.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dell found IT managers lack the tools to properly manage BYOD devices to effectively protect corporate data and intellectual property as well as ensure compliance<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[653],"tags":[2197,420,101,1242,657,1819,216,296,304,1240,4],"class_list":["post-10171","post","type-post","status-publish","format-standard","hentry","category-tablet-computing","tag-2197","tag-aapl","tag-apple","tag-byod","tag-byot","tag-computer","tag-dell","tag-ipad","tag-iphone","tag-mac-os","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10171"}],"version-history":[{"count":24,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10171\/revisions"}],"predecessor-version":[{"id":131373,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10171\/revisions\/131373"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}