Welcome!

Cloud Security Authors: Pat Romanski, Elizabeth White, Liz McMillan, Jose Diaz, Derek Weeks

Related Topics: Cloud Security, Java IoT, Mobile IoT, Agile Computing

Cloud Security: Article

Defining BYOD Policies

In 2013, analysts say there was an 81% growth of mobile devices worldwide.

The rise of mobile is still going strong and it shows no signs of stopping!, In 2013, analysts say there was an 81% growth of mobile devices worldwide.

Actually, according to the new Cisco report - "Mobile Data Traffic Forecast Update" - the mobile traffic in 2013 was 18 times the size of the entire internet in 2000. The study reports that in 2013 the internet traffic per user averaged 356MB of data a month. Even more amazing, is that the trend expects it to increase to 3GB per user in 2018.

All of these changes - the use of mobile data, the internet of things - all have real world applications on our businesses. Now, if you've been getting comfortable with BYOD so far, be careful with the expected twists and turns. More and more devices are being introduced to the market, new services and apps as well. Despite the turbulent start, everyone seems to be jumping on the BYOD wagon; but some companies, who are not planning ahead, should really start looking forward for those upcoming pot holes. CIOs can expect real security threats to emerge, hidden costs, legal affairs with employees and many other issues... The solution? An effective policy covering all angles of the BYOD practice from all its perspectives and of course an MDM tool.

Over the last months organizations' employees have embraced the BYOD practices, CIOs are concerned about security issues, lawyers have given their advice, and MDM vendors have taken their message to the companies. But while CIOs try to come up with the best solution to police this practice, users continue to buy more products and increase the type of devices.

Aberdeen considers that understanding what is going on is a must. They ran a survey this January to find out that 3 of 4 responders have a BYOD program in place; yet two thirds of these plans are not enforcing compliance, security, or legal policies.

Mark Charleton from Blue Solutions told us that CIOs are concerned and thankful with the MDM vendors for pushing their messages of compliance and security to the business managers. This helps them to take this topic to the management table in order to become a BYOD enabler together with the other operational areas including HR, Sales, Marketing, Operations and Legal.

However, all these concerns about hidden costs and hard-to-measure worker productivity don't matter to the employees as their convenience to have business and personal lives blended in one single device. Somehow the tables have turned, the employees are in the driver's seat!

The Dirty Little Secret

Horror... horror!

When it comes to BYOD expense reporting, employee's behavior isn't exactly criminal, but it is cheating. The temptation to submit a huge expense report for the personal smartphone that might have been used for work purposes could be too high to resist.

According to the mobile consultancy "Network Sourcing Advisors," even when the BYOD policies clearly state otherwise employees include their family plans, upgraded phones and termination fees to their BYOD expense plans. Executive globe-trotters would rack up huge international charges and float them past the inattentive eyes of finance.

Companies often counter this abuse by putting a monthly stipend or cap on reimbursement. But let's be honest, most people will ask for the highest stipend and sign up for the biggest data plan so that they won't be hit with overage charges.

The fact is that employees don't really want to pay for their smartphones, tablets, and laptops. They just want an easy-to-use device for their work and their personal life, and of course it is better if the company pays the bill.

This trend is racing towards chaos in the 2014. The number of smartphones, tables and even Laptops under the BYOD umbrella is increasing by day. Complications and confusions are forcing changes to BYOD policies.

Can you COPE?

Some few companies have enabled a hybrid approach called COPE - Company Owned, Personal Enabled - model. COPE is the opposite of BYOD. Businesses using a COPE strategy provide their employees with IT devices and gadgets to be used and managed by them; the companies maintain ownership of such devices, so they can monitor and control their activity to a complete degree. Besides business purposes, employees can use their devices for their personal activities. COPE may be a less expensive option that BYOD, in which employees are often reimbursed for all or part of the cost of the devices they buy. This is because if the company buys devices, it can generally get them for less than retail price. COPE also gives the company more power in terms of policing and protecting devices, thus reducing many of the BYOD risks.

In 2014 and 2015 companies not using COPE will put practical BYOD programs and policies in place. Both mobile models imply the need to accelerate the businesses and move to SaaS. To those that can't COPE, modernize their core applications and become mobile friendly will become a must.

More Strict BYOD Policies

Let's face it, not all companies have budget enough to COPE; so BYOD will yet continue to be a growing trend. Sooner or later, these companies will need to develop effective BYOD policies. Policies should be defined in each area according to the employees activities and needs, to then be detailed and defined mainly by the Finance, Human Resources, and Legal departments that will be in charge of the available budgets and the legal implications that follow.

Once these policies are set up, they can be merged with an MDM tool, this way all the devices would be safely managed and controlled by the responsible areas.

BYOD Lawsuits Loom as Work Gets Personal

Will BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Companies better make sure they have an explicit terms-of-use BYOD agreement.

Like most tragic love stories, the BYOD affair may end up abruptly. In the early days of BYOD, say, 2013, employees fell madly in love with the idea of using their own iPhones, Android smartphones and new tablets for work. They could finally ditch corporate-issued and boring cell phones.

In a beginning BYOD promised that employees and employers would live happily ever after. But the BYOD romance suddenly turned sour. Employees are now questioning the intrusion of corporate eyes on their personal devices. Why did the Internal IT turn their beloved smartphone into a spy that tracks their whereabouts? Employees are beginning to sense companies taking advantage of BYOD by intruding on personal time to get free work time.

If CIOs have hourly employees with BYOD smartphones, they might want to leverage MDM to control the company's email security and delivery rules to those devices; meaning, they can set a business rule that won't allow delivery of corporate email to a subset of users during off-hours. This rule should be also addressed in the BYOD terms-of-use agreement. This is just an example, and the tip of the iceberg.

John Timko, Marketing Director in LabTec Software explained that MDM software has thankfully advanced quickly and has come up with a fix. Now companies can control only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. While this helps tremendously, it doesn't completely solve the problem.

Let's say a company buys the popular productivity app, Evernote, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time regardless of the personal data the employee may have added such as a shopping list, recipes, vacation plans, or perhaps something more critical to their job.

In conclusion, companies need to have better protections against employee's lawsuits regarding the BYOD practice, a well developed terms-of-use agreement, and leverage MDM to ensure this agreement is followed. Truth is, employees tend to get a bit emotional when their privacy is being violated or their location is being tracked via a mobile device that they personally own. They don't like their personal data to be seen or wiped, either. When these things happen, companies can expect the wrath of a scorned employee.

More Stories By Monica Paul

Monica Paul is a marketer with 20 years experience in local, regional, and global marketing strategies. In 2001, after 8 years working as an employee for several IT companies such as Micrografx and Visio; Monica founded Marcomtec, marketing firm giving services initially to the IT industry that then diversified to other industries. In 2013 Monica launched, Magic MasterMinds (www.magicmasterminds.com), a marketing platform to help writers all over the world to market their books leveraging this way reading as a daily activity.

@ThingsExpo Stories
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, will discuss the importance of WebRTC and how it enables companies to fo...
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
Korean Broadcasting System (KBS) will feature the upcoming 18th Cloud Expo | @ThingsExpo in a New York news documentary about the "New IT for the Future." The documentary will cover how big companies are transmitting or adopting the new IT for the future and will be filmed on the expo floor between June 7-June 9, 2016, at the Javits Center in New York City, New York. KBS has long been a leader in the development of the broadcasting culture of Korea. As the key public service broadcaster of Korea...
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit y...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will discuss the vast to...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
SYS-CON Events announced today the How to Create Angular 2 Clients for the Cloud Workshop, being held June 7, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified. Now it’s a component-based well-performing framework. The immersive one-day workshop led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and...
Customer experience has become a competitive differentiator for companies, and it’s imperative that brands seamlessly connect the customer journey across all platforms. With the continued explosion of IoT, join us for a look at how to build a winning digital foundation in the connected era – today and in the future. In his session at @ThingsExpo, Chris Nguyen, Group Product Marketing Manager at Adobe, will discuss how to successfully leverage mobile, rapidly deploy content, capture real-time d...
IoT generates lots of temporal data. But how do you unlock its value? How do you coordinate the diverse moving parts that must come together when developing your IoT product? What are the key challenges addressed by Data as a Service? How does cloud computing underlie and connect the notions of Digital and DevOps What is the impact of the API economy? What is the business imperative for Cognitive Computing? Get all these questions and hundreds more like them answered at the 18th Cloud Expo...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
SYS-CON Events announced today that ContentMX, the marketing technology and services company with a singular mission to increase engagement and drive more conversations for enterprise, channel and SMB technology marketers, has been named “Sponsor & Exhibitor Lounge Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York. “CloudExpo is a great opportunity to start a conversation with new prospects, but what happens after the...
SYS-CON Events announced today that 24Notion has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. 24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to con...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...