BYOD Security Challenges Addressed

Many companies implementing a “Bring Your Own Device” policy at are causing headaches for IT departments trying to secure the corporate network. BYOD in the corporate environment has been implemented for many reasons, employee satisfaction and reduction of expenses being at the top of the list. Other benefits of BYOD include increased mobility, higher job satisfaction, as well as improvements in efficiency and productivity. In fact, a survey showed that those workers who use mobile devices for both work and personal situations put in an average of 240 more hours annually than workers who do not.
Fluke Networks has addressed this concern with a new, dedicated sensor that monitors the WiFi network and doesn’t require any Ethernet cabling.
Easily-installed Wireless network security
By not requiring cabling, the installation costs are reduced by up to two thirds, particularly in locations where cabling installation is logistically difficult.
Network Security
Since the use of Wireless LANs is significantly growing, and more organizations are implementing BYOD policies, the need for WiFi security monitoring is rapidly increasing.

iOS 6

iOS 6, released last Thursday from Apple, is designed for operation in the BYOD environment. The new operating system offers more management options for IT departments, which can help with the BYOD policy in many organizations. Since it was the iPhone that is mostly responsible for the Bring Your Own Device movement, it’s only fitting that it lead the way to a more manageable solution.

Reasons Against BYOD:

The most effective argument against the BYOD policy is the phone number problem. When your sales team is using their personal devices, and they give their phone number out to clients, they’re giving out their personal number. That means that when a sales person leaves, they take their phone number (and perhaps their clients) with them.
Bring your own device
When a device is lost or stolen, another problem arises. How can the company remotely wipe the device when it’s not just their data being stored on it? There are many legal loopholes to jump through that are non-existent in organizations that use exclusively company-owned devices.


Leave a Reply

Your email address will not be published. Required fields are marked *