Bradford Networks (http://www.bradfordnetworks.com) the best choice to enable secure network access for corporate issued and personal mobile devices, has outlined a clear roadmap for organisations trying to implement a secure Bring Your Own Device (BYOD) strategy (http://www.bradfordnetworks.com/enterprise).
Entitled the ‘10 immediate steps to a secure BYOD process’, it outlines what corporate IT departments need to know and how they can prepare when employees turn up with an array of mobile devices, including smartphones, laptops, tablets and eReaders, looking for network access.
With 472 million smartphones sold across the globe during 2011, making up nearly a third of all mobile devices sold last year, according to research analyst Gartner, and the overall mobile device market expected to grow by around seven per cent this year, there are clear signs the BYOD trend is set to become a business reality.
Frank Andrus, CTO for Bradford Networks and one of the architects of the 10-step process, says: “Most of these tablets, smartphones and other mobile devices will end up in the hands of employees who are now bringing them into the workplace and fully expecting to just turn up and log on. Combine this with the Facebook generation who have grown up with their own mobile technology at university or college and wouldn’t have it any other way.
“Network and security professionals need to be prepared though. It’s no longer acceptable to prohibit the use of personal mobile devices in the workplace – as more employees demand to be able to use their own technology on corporate networks, businesses have to consider and deliver a BYOD policy that bridges productivity with network security.”
The 10-step process is designed to enable IT departments in enterprises, educational and healthcare institutions to create and implement a BYOD policy that covers everything from what OS versions should be allowed, to providing network access based on role and device type.
Ten steps to a secure BYOD process:
1. Determine what mobile devices your organisations will allow = acceptable, safe devices
2. Determine the OS versions allowed = secure OS versions
3. Determine what applications are required and or mandatory and those not permitted = security, configuration
4. Determine what groups of employees will be allowed to use these devices = device policies by user
5. Determine what network accesses will be assigned based on who, what, were and when
6. Educate you employees before they buy mobile devices = communicate policies
7. Inventory authorised and unauthorised devices = trusted vs. untrusted
8. Inventory authorised and unauthorised users = trusted vs. untrusted
9. Controlled network access based on risk posture = provision network access
10. Continuous vulnerability assessment and remediation = enhance other solutions
Bradford Networks has produced an infographic to support its 10-step process and illustrating each point above. If you would like a copy, please contact the media team below.
Six Degrees Limited
This press release was distributed by ResponseSource Press Release Wire on behalf of Six Degrees Limited in the following categories: Health, Education & Human Resources, Computing & Telecoms, for more information visit https://pressreleasewire.responsesource.com/about.