Click here to close now.

Welcome!

Cloud Security Authors: Dana Gardner, Pat Romanski, Elizabeth White, Liz McMillan, Harry Trott

Related Topics: Cloud Security, Java IoT, Mobile IoT, Agile Computing

Cloud Security: Article

Defining BYOD Policies

In 2013, analysts say there was an 81% growth of mobile devices worldwide.

The rise of mobile is still going strong and it shows no signs of stopping!, In 2013, analysts say there was an 81% growth of mobile devices worldwide.

Actually, according to the new Cisco report - "Mobile Data Traffic Forecast Update" - the mobile traffic in 2013 was 18 times the size of the entire internet in 2000. The study reports that in 2013 the internet traffic per user averaged 356MB of data a month. Even more amazing, is that the trend expects it to increase to 3GB per user in 2018.

All of these changes - the use of mobile data, the internet of things - all have real world applications on our businesses. Now, if you've been getting comfortable with BYOD so far, be careful with the expected twists and turns. More and more devices are being introduced to the market, new services and apps as well. Despite the turbulent start, everyone seems to be jumping on the BYOD wagon; but some companies, who are not planning ahead, should really start looking forward for those upcoming pot holes. CIOs can expect real security threats to emerge, hidden costs, legal affairs with employees and many other issues... The solution? An effective policy covering all angles of the BYOD practice from all its perspectives and of course an MDM tool.

Over the last months organizations' employees have embraced the BYOD practices, CIOs are concerned about security issues, lawyers have given their advice, and MDM vendors have taken their message to the companies. But while CIOs try to come up with the best solution to police this practice, users continue to buy more products and increase the type of devices.

Aberdeen considers that understanding what is going on is a must. They ran a survey this January to find out that 3 of 4 responders have a BYOD program in place; yet two thirds of these plans are not enforcing compliance, security, or legal policies.

Mark Charleton from Blue Solutions told us that CIOs are concerned and thankful with the MDM vendors for pushing their messages of compliance and security to the business managers. This helps them to take this topic to the management table in order to become a BYOD enabler together with the other operational areas including HR, Sales, Marketing, Operations and Legal.

However, all these concerns about hidden costs and hard-to-measure worker productivity don't matter to the employees as their convenience to have business and personal lives blended in one single device. Somehow the tables have turned, the employees are in the driver's seat!

The Dirty Little Secret

Horror... horror!

When it comes to BYOD expense reporting, employee's behavior isn't exactly criminal, but it is cheating. The temptation to submit a huge expense report for the personal smartphone that might have been used for work purposes could be too high to resist.

According to the mobile consultancy "Network Sourcing Advisors," even when the BYOD policies clearly state otherwise employees include their family plans, upgraded phones and termination fees to their BYOD expense plans. Executive globe-trotters would rack up huge international charges and float them past the inattentive eyes of finance.

Companies often counter this abuse by putting a monthly stipend or cap on reimbursement. But let's be honest, most people will ask for the highest stipend and sign up for the biggest data plan so that they won't be hit with overage charges.

The fact is that employees don't really want to pay for their smartphones, tablets, and laptops. They just want an easy-to-use device for their work and their personal life, and of course it is better if the company pays the bill.

This trend is racing towards chaos in the 2014. The number of smartphones, tables and even Laptops under the BYOD umbrella is increasing by day. Complications and confusions are forcing changes to BYOD policies.

Can you COPE?

Some few companies have enabled a hybrid approach called COPE - Company Owned, Personal Enabled - model. COPE is the opposite of BYOD. Businesses using a COPE strategy provide their employees with IT devices and gadgets to be used and managed by them; the companies maintain ownership of such devices, so they can monitor and control their activity to a complete degree. Besides business purposes, employees can use their devices for their personal activities. COPE may be a less expensive option that BYOD, in which employees are often reimbursed for all or part of the cost of the devices they buy. This is because if the company buys devices, it can generally get them for less than retail price. COPE also gives the company more power in terms of policing and protecting devices, thus reducing many of the BYOD risks.

In 2014 and 2015 companies not using COPE will put practical BYOD programs and policies in place. Both mobile models imply the need to accelerate the businesses and move to SaaS. To those that can't COPE, modernize their core applications and become mobile friendly will become a must.

More Strict BYOD Policies

Let's face it, not all companies have budget enough to COPE; so BYOD will yet continue to be a growing trend. Sooner or later, these companies will need to develop effective BYOD policies. Policies should be defined in each area according to the employees activities and needs, to then be detailed and defined mainly by the Finance, Human Resources, and Legal departments that will be in charge of the available budgets and the legal implications that follow.

Once these policies are set up, they can be merged with an MDM tool, this way all the devices would be safely managed and controlled by the responsible areas.

BYOD Lawsuits Loom as Work Gets Personal

Will BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Companies better make sure they have an explicit terms-of-use BYOD agreement.

Like most tragic love stories, the BYOD affair may end up abruptly. In the early days of BYOD, say, 2013, employees fell madly in love with the idea of using their own iPhones, Android smartphones and new tablets for work. They could finally ditch corporate-issued and boring cell phones.

In a beginning BYOD promised that employees and employers would live happily ever after. But the BYOD romance suddenly turned sour. Employees are now questioning the intrusion of corporate eyes on their personal devices. Why did the Internal IT turn their beloved smartphone into a spy that tracks their whereabouts? Employees are beginning to sense companies taking advantage of BYOD by intruding on personal time to get free work time.

If CIOs have hourly employees with BYOD smartphones, they might want to leverage MDM to control the company's email security and delivery rules to those devices; meaning, they can set a business rule that won't allow delivery of corporate email to a subset of users during off-hours. This rule should be also addressed in the BYOD terms-of-use agreement. This is just an example, and the tip of the iceberg.

John Timko, Marketing Director in LabTec Software explained that MDM software has thankfully advanced quickly and has come up with a fix. Now companies can control only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. While this helps tremendously, it doesn't completely solve the problem.

Let's say a company buys the popular productivity app, Evernote, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time regardless of the personal data the employee may have added such as a shopping list, recipes, vacation plans, or perhaps something more critical to their job.

In conclusion, companies need to have better protections against employee's lawsuits regarding the BYOD practice, a well developed terms-of-use agreement, and leverage MDM to ensure this agreement is followed. Truth is, employees tend to get a bit emotional when their privacy is being violated or their location is being tracked via a mobile device that they personally own. They don't like their personal data to be seen or wiped, either. When these things happen, companies can expect the wrath of a scorned employee.

More Stories By Monica Paul

Monica Paul is a marketer with 20 years experience in local, regional, and global marketing strategies. In 2001, after 8 years working as an employee for several IT companies such as Micrografx and Visio; Monica founded Marcomtec, marketing firm giving services initially to the IT industry that then diversified to other industries. In 2013 Monica launched, Magic MasterMinds (www.magicmasterminds.com), a marketing platform to help writers all over the world to market their books leveraging this way reading as a daily activity.

@ThingsExpo Stories
SYS-CON Events announced today that Intelligent Systems Services will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Established in 1994, Intelligent Systems Services Inc. is located near Washington, DC, with representatives and partners nationwide. ISS’s well-established track record is based on the continuous pursuit of excellence in designing, implementing and supporting nationwide clients’ mission-critical systems. ISS has completed many successful projects in Healthcare, Commercial, Manu...
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect their organization.
SYS-CON Events announced today that SoftLayer, an IBM company, has been named “Gold Sponsor” of SYS-CON's 17th International Cloud Expo®, which will take place November 3–5, 2015 at the Santa Clara Convention Center in Santa Clara, CA. SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer’s modular architecture, full-featured API, and sophisticated automation pro...
The enterprise market will drive IoT device adoption over the next five years. In his session at @ThingsExpo, John Greenough, an analyst at BI Intelligence, division of Business Insider, analyzed how companies will adopt IoT products and the associated cost of adopting those products. John Greenough is the lead analyst covering the Internet of Things for BI Intelligence- Business Insider’s paid research service. Numerous IoT companies have cited his analysis of the IoT. Prior to joining BI Intelligence, he worked analyzing bank technology for Corporate Insight and The Clearing House Payment...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infrastructure as a service.
SYS-CON Events announced today that WHOA.com, an ISO 27001 Certified secure cloud computing company, participated as “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which took place June 9-11, 2015, at the Javits Center in New York City, NY. WHOA.com is a leader in next-generation, ISO 27001 Certified secure cloud solutions. WHOA.com offers a comprehensive portfolio of best-in-class cloud services for business including Infrastructure as a Service (IaaS), Secure Cloud Desktop, Cloud Storage, Disaster Recovery, Integrated Applications and Security.
SYS-CON Events announced today that kintone has been named “Bronze Sponsor” of SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. kintone promotes cloud-based workgroup productivity, transparency and profitability with a seamless collaboration space, build your own business application (BYOA) platform, and workflow automation system.
SYS-CON Events announced today that CommVault has been named “Bronze Sponsor” of SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. A singular vision – a belief in a better way to address current and future data management needs – guides CommVault in the development of Singular Information Management® solutions for high-performance data protection, universal availability and simplified management of data on complex storage networks. CommVault's exclusive single-platform architecture gives companies unp...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
"ciqada is a combined platform of hardware modules and server products that lets people take their existing devices or new devices and lets them be accessible over the Internet for their users," noted Geoff Engelstein of ciqada, a division of Mars International, in this SYS-CON.tv interview at @ThingsExpo, held June 9-11, 2015, at the Javits Center in New York City.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fillin...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Among the proven benefits, DevOps is corr...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust IoT ...
SYS-CON Events announced today that Secure Infrastructure & Services will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Secure Infrastructure & Services (SIAS) is a managed services provider of cloud computing solutions for the IBM Power Systems market. The company helps mid-market firms built on IBM hardware platforms to deploy new levels of reliable and cost-effective computing and high availability solutions, leveraging the cloud and the benefits of Infrastructure-as-a-Service (IaaS...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context wi...
The basic integration architecture, as defined by ESBs, hasn’t changed for more than a decade. Most cloud integration providers still rely on an ESB architecture and their proprietary connectors. As a result, enterprise integration projects suffer from constraints of availability and reliability of these connectors that are not re-usable across other integration vendors. However, the rapid adoption of APIs and almost ubiquitous availability of APIs amongst most SaaS and Cloud applications are rapidly redefining traditional integration approaches and their reliance on proprietary connectors. ...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Architect for the Internet of Things and Intelligent Systems, described how to revolutionize your archit...
To many people, IoT is a buzzword whose value is not understood. Many people think IoT is all about wearables and home automation. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed some incredible game-changing use cases and how they are transforming industries like agriculture, manufacturing, health care, and smart cities. He will discuss cool technologies like smart dust, robotics, smart labels, and much more. Prepare to be blown away with a glimpse of the future.