Here you will find General Info on all OfficeSuite® UC products and features. Need more details? Want to ask your own question? Just register and become a member!

Bring Your Own Device Webinar Replay Now Available! See how OfficeSuite Helps You Embrace BYOD

edited June 2015 in General Info
If you missed the May Office Hours webinar on BYOD, never fear! Here is the webinar replay.

Below that you'll find a snippet of our blog article that was featured in the webinar.

Make sure to check out the full article on our OfficeSuite Blog: "BYOD Best Practices: From BYOD 1.0 to BYOD 2.0".






With summer just around the corner, mobility is even more popular than normal. As we’re spending weekends at the shore, visiting nearby mountains and lakes, and going to friends’ and neighbors’ barbeques, we’re going to need to stay in touch with business from our smartphones, tablets and laptops. Such is this ‘always-on’ business world that we live in.

image
Whether it’s vacation season or not, the demand for mobility in business in general has been growing steadily, fueling the adoption of the Bring Your Own Device (BYOD) movement. If your business is ready to embrace the rewards of BYOD (think happier, more productive employees), it’s time to get serious about mitigating the risks that come along with allowing personal devices to access your company network.
Let’s explore BYOD’s evolution; take a look at the risks and rewards of embracing BYOD; and then take a deeper dive into how to balance it all so that you and your employees can enjoy the best of both worlds.

BYOD 1.0

BYOD 1.0 is roughly defined as occurring from 2009 to 2012, but you could argue that it all started back in 2007 when more and more business professionals began switching from their BlackBerry® devices to the newly-introduced iPhones®. When BlackBerry ruled the business mobility scene, security was much easier for the Information Technology (IT) department.  IT purchased, distributed and managed the devices for employees. At this stage, IT only had to concern itself with protecting two things:

1) The device itself and any data stored on it. (Known as Mobile Device Management, or MDM.)

2) The connection between the device and the corporate network. (Known as Virtual Private Network, or VPN.)

While this may seem easy as compared to today’s BYOD challenges, it actually caused frustration for both IT and employees, and here’s why. With BYOD 1.0, it was all or nothing, meaning IT had to protect the entire device and any data and activity on it. There was no way to hone in on the company data and leave an employee’s personal data and activity alone.

To continue reading, click here.




















Sign In or Register to comment.