Understanding consumer device management and the BYOD trend

Mastering the BYOD trend: The ultimate guide

Understanding consumer device management and BYOD

Organizations can't just dive into BYOD without having the proper groundwork in place. You need to understand why BYOD started, where it's going, what the risks are and how to address consumer device management.

With BYOD, it's important to start on the right foot. If you're adopting BYOD simply because you see it as a money-saver, you might be unpleasantly surprised. And if you think BYOD is just about end users, you might find that it's more IT-focused than you realized.

In this part:

BYOD basics

Bringing BYOD to the enterprise
Your employees want to bring their devices to work. In fact, they probably already are. Bringing BYOD to your organization can be good for IT and users alike, but there need to be clear policies and consumer device management tools so admins can manage and secure enterprise data, no matter who owns the devices.

Making a BYOD program work

If you want your BYOD program to work, you can't just slap it together. Before you implement, make sure you've planned well, developed policies and put together a security strategy.

BYOD FAQ: Answers to IT's burning questions

BYOD isn't an easy thing to roll out, maintain or manage. But the answers in this BYOD FAQ can help you get a handle on application control, consumer device management, acceptable use policies, app delivery options -- including cloud storage and enterprise app stores -- and how to create a BYOD policy.

Taking advantage of BYOD

An opportunity for IT evolution
Most of the time you hear about all the risks and management headaches around BYOD, but behind all those problems is a chance for IT evolution. Not since the '90s have admins had the chance to make this big a change, and BYOD is just that chance. It's less about embracing devices and more about looking to the future of the IT landscape.

How IT can learn to stop worrying and love BYOD: An MDM FAQ
By now, users bringing devices to work is old news. What's on IT's mind is mobile device management (MDM), which can be a great option for managing personal devices. Of course, you'll have some questions about consumer device management on Android and iOS devices and which MDM features to choose. Find the answers in this MDM FAQ.

Supporting BYOD customers with cloud: Defining Workplace as a Service
Workplace as a Service (WaaS) is the cloud provider response to BYOD. It uses the cloud to bring the office to workers, wherever they are. WaaS options let workers access the apps and data they need in ways that are appropriate for their location, the organization's security requirements and device type.

Want control over BYOD and the cloud? Check out Identity as a Service tools
Everyone who isn't already using the cloud is moving there, so IT needs new ways to provide identity management and application delivery. That's where Identity as a Service tools come in. With IDaaS, users get a single sign-on to the cloud through a third-party provider, which means IT doesn't have to manage tons of logins.

Simplifying BYOD device management with VDI
IT departments that use virtual desktop infrastructure (VDI) to give BYOD users access to virtual desktops say the consumer device management benefits they reap outweigh any cons. VDI is more secure than are physical desktops, and it allows users to connect to their desktops from any device.

BYOD gotchas

Creating a bring-your-own-device policy
If IT and management don't create a BYOD policy, they're just asking for management and security nightmares. When you're crafting your bring-your-own-device policy, make sure you consider acceptable use, device selection, reimbursement, applications and security. And don't forget to write agreements for users to review and sign.

BYOD policy 101: Defining and enforcing a successful program
Even the most basic BYOD policy requires a section that defines the rules and another section on how the organization will enforce them. You might already have the tools you need to enforce your policies; ActiveSync is a popular option, as are third-party apps.