As the readers of the SunView Software blog know, I am a huge proponent of the IT Organization having a fully developed BYOD policy and Mobile Device Management (MDM) and Mobile Application Management (MAM) systems in place. Unfortunately, the consumerization of IT is a fast-moving target, one that requires a company wide policy and buy in from most of the enterprise's lines of business.
Before implementation of a policy and an MDM solution, it is essential to have Change and Release management and a plan for the Service Desk support of BYOD. We have written several posts on the topic. If you are looking for a solution to help implement your BYOD policy, try the ChangeGear Test Drive.
In the article, As BYOD explodes, IT managers learn to cope by Beth Stackpole in Computerworld, she reveals the current state of BYOD in 5 IT environments. Even though iOS is the predominate OS, others are making inroads that will undoubtedly impact support and security, such as Android, Windows 8, and Blackberry. Below is an overview of the 5 case studies:
Booz Allen Hamilton, McLean, VA
Joe Mahaffee, Executive Vice President and Chief Information Security Officer
Has corporate policies in place and an MDM system, mobile users must have encryption and password protection on devices, MDM system automatically enforces policies and allows IT to selectively wipe devices of corporate data and apps.
Massachusetts Convention Center Authority (MCCA), Boston, MA (Boston Strong)
Steven Snyder, CIO and CTO
Standardized on one mobile platform, Apple, simplifying development and support, mobile device management is critical for control, procedures are in the policy manuals, and users are working with a high-end device on the company's dime.
"We're not going to be Big Brother, but if we need to wipe it, we're going to wipe it, and it's too bad if you don't have your stuff backed up," Snyder says.
Clif Bar, Emeryville, CA
Gary Hensley, IT Director
250 company-owned Apple iOS devices, including smartphones and tablets, three-pronged approach to mobile device management:
- Formulating usage and security policies
- Creating a business case for the use of mobile devices
- MDM system and creating processes to oversee and manage the devices.
Hensley says he was nervous about the resulting support demands that would fall to his already strapped 13-person IT team.
Novation, Irving, Tx.
Guillermo Ramas, Vice President of Commercial Solutions
Workers are allowed to use any device, need to follow proper security protocols. no formal help desk support. Prototyping an MDM strategy - important security controls, will eventually move to "agentless" MDM, which doesn't reside on the client device.
Riverside Medical Center, Kankakee, IL
Erik Devine, CISO
Riverside owns, manages 300 mobile devices, a mix of Android tablets and phones and iPhones and iPads, all of which are supported by IT. Enterprise Mobility Management (EMM) software lets the IT department restrict the apps and content that can be loaded onto a device, deploy two-factor authentication and remotely wipe devices if they are misplaced or stolen, can use personal devices provided they sign an agreement and install EMM on their devices.
The biggest concern with BYOD is data leakage.
After seeing the overview of these 5 case studies, how does your BYOD policy and MDM solution match up? Are you ready for the next big thing in consumerization?
Flickr Image by ajleon