SYS-CON MEDIA Authors: Yeshim Deniz, Elizabeth White, Roger Strukhoff, Jason Bloomberg, Pat Romanski

Blog Feed Post

Are You Seeking to Improve Mobility and Enable BYOD? – Part 1: Getting Started

It Starts with a Problem

Any technology project usually starts with a problem. Whether it is a CEO wanting to use her Mac while the company issues Windows laptops, or a company-issued device walking off with a former salesperson, organizations are constantly reassessing their end-user device strategy. As a result, BYOD and Mobility have become the buzz words of the year. Ready to consider a BYOD strategy? Being forced to create one for a handful of users? What do you need to know? Read on.

BYOD does not mean lack of control or security

One of the main reasons IT directors are hesitant to roll out BYOD policies is a perceived of lack of control. If workers bring their own devices to work, what stops them from taking confidential company information with them if they leave?

The reality is that the technologies built to enable BYOD actually help organizations protect their data. Using a virtual desktop allows workers to bring their own devices to work, while keeping their work and access to company files in that virtual desktop under company control. When an employee leaves, you can simply disable the virtual desktop and the risk of data leakage is mitigated.

In many cases, we’re afraid of allowing end-users to bring their own laptop but we’re happy to allow our end-users to access their company email on their shiny new (and personally owned) Apple or Android device. Smart strategies around mobile device management (MDM) can help you secure, configure, locate or even erase unrecoverable devices. 

Tools of the Trade: Products that Enable Mobility and BYOD

So where do you start? Consider these enabling technologies and how they may fit into your business.

  • Virtual Desktops / Desktop as a Service (DaaS): Virtual desktops provide a portable work environment that is independent of the local machine. Access to work applications, and mitigation of issues occur in the company provided desktop image. In many cases, mitigation takes the form of simply issuing a new virtual image. So – work anywhere (mobility) on any device (BYOD).
  • RMM: Remote Monitoring & Management provides the ability to manage various physical and virtual machines from a centralized location. So, bring whatever device you want but install the RMM agent to your machine, which allows administrators to monitor and manage it. RMM is a self-managed, cloud-based platform that provides IT departments with point and click monitoring; centralized management and performance reporting of desktop and server assets (physical and virtual), mobile devices and network equipment (switches, routers, firewalls, printers); patch management; and remote control in a single pane of glass regardless of the location and type of end-user environment.
  • MDM: Mobile Device Management is often times a feature of a good RMM platform or can be purchased independently. Also agent based, MDM enables standardized security rules, software distribution, remote delete and device location. Get a hold of those pesky mobile devices!

Unified Communications: UC applications that are location independent enable mobility in several ways. Link your cell phone to your office phone, and transfer calls seamlessly between them (all while maintaining the office phone number). Mobile and desktop applications enable users to see their co-workers’ presence status (available, on a call, in a meeting, etc.), and if they are available, can chat with them via instant message (IM) from the UC app. All of these features are available to end users regardless of location or device.

If you’re interested in improving your organization’s Mobility and BYOD status, check out our recent Mobility and BYOD survey paper.

The post Are You Seeking to Improve Mobility and Enable BYOD? – Part 1: Getting Started appeared first on Evolve IP.

Read the original blog entry...

More Stories By Scott Kinka

Scott Kinka is Chief Technology Officer for Evolve IP. He has spent almost his entire career devising new and simpler ways for companies to acquire and integrate technology. While all of the tech talk these days is about the cloud, he was doing this when it was called ASP (application service provider) or on-demand. Before Scott joined Evolve IP as Chief Technology Officer, he served as Vice President of Network Services for Broadview Networks and ATX Communications. He has been involved in application development, hosting, messaging, networking, unified communications, contact centers, and security. His mission (and specialty) is acting as a translator between technology and business needs.

Latest Stories
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City. Our Silicon Valley 2019 schedule will showcase 200 keynotes, sessions, general sessions, power panels, and...
ShieldX's CEO and Founder, Ratinder Ahuja, believes that traditional security solutions are not designed to be effective in the cloud. The role of Data Loss Prevention must evolve in order to combat the challenges of changing infrastructure associated with modernized cloud environments. Ratinder will call out the notion that security processes and controls must be equally dynamic and able to adapt for the cloud. Utilizing four key factors of automation, enterprises can remediate issues and impro...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio a...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. DevOpsSUMMIT at CloudEXPO expands the DevOps community, enable a wide sharing of knowledge, and educate delegates and technology providers alike.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...