The benefits were numerous – anyone can work from anywhere, you get to (finally) use your latest ‘n’ greatest device, IT wouldn’t have to support loads of corporate machines, and money would be saved – sounds like a plan! The reality, however, was and still is to some extent, very different.
The term BYOT was coined and for good reason. Allowing network access from an unknown and potentially malware infected device caused raised eyebrows and not a small amount of arm waving and hand wringing amongst IT Security teams. All that money, time and effort to build robust perimeter security systems and we’re going to let people get access to the network using something we can’t control? Don’t think so – we need to manage this somehow.
Cue, MDM – problem solved! Happy days, we can all sleep soundly.
Unfortunately, MDM systems were not the panacea most people thought. Whilst they do, indeed, manage mobile devices, most are too restrictive, offer a poor user experience, can be difficult to configure correctly and challenging to manage. Too often the outcome is that they are either configured to the lowest common denominator (and become ineffective) or are simply turned off.
How about a solution where the mobile device has two completely separate virtual personalities? One for personal stuff and one for corporate. Corporate data can be encrypted and stored in reserved memory. Controls can be put in place to prevent copy/paste/forwarding of information and provide simple, straightforward, management of the corporate data only. No more risk of inadvertently deleting the users Wedding pictures or video of when they met the Queen!
Well, such a solution exists – and you don’t need to purchase special (cut-down) applications for the mobile device. So, now you can deliver a real BYOD strategy in your organisation without the headaches and sleepless nights.