How organisations can keep the BYOD blues at bay

Keeping BYOD users secure and happy

The trend for individuals to 'bring their own device' (BYOD) to work is increasing, but enabling BYOD has been much easier than understanding and managing its security implications.

I believe we need to find practical ways to support consumer technology at work while maintaining control of sensitive information. The core principle is to minimise the amount of data transferred to or held on the device.

There are three steps organisations can take:

  1. Virtualise applications and stream them to the device.
  2. Allow access but implement a corporate policy to prevent the user downloading sensitive organisational data. If the organisation wants to allow data to be downloaded, it becomes the user's responsibility if they lose the device, and they need to be made aware of the consequences and their responsibilities.
  3. Take advantage of the remote wipe capability that most devices have, using encryption to secure sensitive data, and ensure that the organisation's BYOD policy mandates implementing Mobile Device Management (MDM) capability on the BYOD device.

Virtualisation

As a first step, we recommend classifying users according to their job requirements and need, and then providing device, services and applications they require to fulfil their job using a virtualised solution.

Organisations can choose one of three ways to implement virtualisation: a hosted or virtual desktop, client hypervisors, or accessing applications through a portal.

A hosted or virtual corporate desktop requires software such as Quest (now Dell Software), Citrix or VMware, appropriate back end systems and network connectivity to deliver desktop or application. It will work across all types of device, including all major tablets and Windows, Android or Apple phones.

The IT team needs to ensure the device is reasonably secure and not infected, with appropriate virus protection, as well as installing appropriate client software.

Policies can be set to prevent downloading information to local devices or cutting and pasting between the virtual desktop and local device. However, the user can only work on corporate applications when connected to the network.

Virtual Desktop

A second option is to install client hypervisors and virtual desktop check-in/check-out software on the device, such as MokaFive, Citrix Xenclient, VMware View offline or Windows 8 HyperV. It creates separate, bootable desktops on the device and partitions the hard drive into business and personal areas.

As this can be run locally, it's a good solution if the user needs to work offline. When they go online it checks back into the server (using a VMware/Citrix solution) or synchronises (using MokaFive/Quest).

It's particularly good with laptops, but won't work with all devices as you cannot run a full corporate desktop on devices such as an iPad. It also creates more work for the IT team, who have to configure the device and install the client hypervisor to accept the virtual desktop.

Application Streaming

The third option is to package applications to be accessed through a portal using either application streaming or the creation of lightweight clients (apps).

These apps can run on a smartphone or tablet, as most of the processing is carried out by the web-based back end. However, it becomes more difficult if the user wants to run 'large' applications such as SAP or Microsoft Office.

In the longer term, we believe most organisations will choose this route.

  • Richard founded Fordway in 1991 and has built it into one of the UK's most respected IT infrastructure change providers. An ex-technician, his 20+ years' experience enable him to prioritise business-critical problems and offer constructive, vendor independent advice.
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Meta warns of worrying security flaw hitting open source type software
Hand holding smartphone and scan fingerprint biometric identity for unlock her mobile phone
Passwordless authentication continues to grow, with biometrics helping push adoption
Data leak
Hacked Tata Technologies data leaked by ransomware gang
Latest in News
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
CEOs think they might lose their jobs if they can't deliver on AI
Tony Hawk's Pro Skater 3+4
From Ace of Spades to Them Bones, Tony Hawk's Pro Skater 3+4's soundtrack is already looking excellent
The Google Gemini logo against a black background.
I tried Gemini's new AI image generation tool - here are 5 ways to get the best art from Google's upcoming Flash 2.0 built-in image upgrade
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Eurocom Raptor X18
At $15,000, this massive 256GB RAM laptop makes Apple's MacBook Pro look affordable, tiny and very, very slow
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character