Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Keys to enabling an effective and secure BYOD programme

Adrian M. Reodique | Feb. 15, 2017
Experts from IDC, Microsoft, IBM, and VMware shared tips on how APAC businesses can successfully implement a BYOD programme.

3.       Put BYOD policies and security strategy in place

CIOs must set strict BYOD policies in place to secure corporate data. "Without such policies, employees will not know what devices and apps are permissible or not, the size limitations for attachments, what constitutes a breach, what kind of support is provided by the company's IT department, and the actions which the company will take in the event of a security breach," said Burns.

"For any organisation today, data is their most critical asset. So understanding who, where and how this asset is being accessed should be the first step in designing a device policy," said Sundaram.

In addition, Ngoh said BYOD policies must be supported by an engine that can protect sensitive information through an automated security protocols. "Remote wiping, full or selective device wipes, customisable warnings, and protecting the data stored in applications is key to guarding sensitive information. Another criterion for such policy management is to enforce access decisions based on a range of conditions, including strength of authentication, network, location and device compliance. Powerful policy controls ensure that IT can protect against compromised devices," he explained.

4.       Offer a flexible choice of devices and apps 

Since Ngoh believes BYOD is all about flexibility and choice, he said that a unified management platform can help support an employee's device of choice and leverage an OS management interface to self-configure laptops, smartphones, and tablets for immediate use. "CIOs can consider apps that seamlessly support businesses for both basic and advanced organisational requirements," he added.

Besides that, CIOs must also enable self-service access to enterprise applications, such as one-touch access to enterprise applications via Single-Sign On authentication when onboarding new applications. "Employees demand the same level of intuitiveness in applications they use at work as they do in their personal lives. Enterprises must allow for instant access to a personalised enterprise application store where they can subscribe to virtually any mobile, cloud or windows application," Ngoh explained.

5.       Test the BYOD model

Before fully deploying the BYOD programme, CIOs must first conduct a test trial of the model to determine the flaws of the programme and make the necessary tweaks.  "Test the waters and deploy a BYOD policy across a subset of users until you are comfortable with the model before rolling out to the wider employee base," advised Burns. 


Previous Page  1  2  3  4 

Sign up for CIO Asia eNewsletters.