BYOPC program guide: How to implement BYOPC, start to finish

How to get a BYOPC program up and running

Employees are increasingly bringing their own devices into the workplace, and those personal laptops, tablets and smartphones entering the enterprise can benefit both employees and businesses. To maximize the benefits and minimize the risks of a BYOPC program, IT managers and administrators should develop clear policies and implementation guidelines.

As businesses adopt practices for bring your own PC (BYOPC) and bring your own device (BYOD), desktop administrators will assume new responsibilities. They'll need to explain the risks, benefits and costs of BYOPC and BYOD to executives. Employees will look to IT for support and for help complying with company policies.

Desktop admins must craft acceptable-use and other policies, implement security controls and troubleshoot implementation problems. IT professionals also need to work with developers to find the best way to deliver business applications to a wide range of devices while preserving the integrity of the enterprise's infrastructure and data.

Table of contents:

Creating BYOPC policies: A win-win for IT and users
Defining BYOPC policies lets users know what they can and can't do when their PCs are connected to the network. With policies in place, employees won't have excuses not to comply.

BYOPC security simplified: Basic tools IT needs to manage PCs
BYOPC security can present problems: Securing PCs isn't the same as securing corporate desktops. Make sure you can authenticate devices and enforce policies.

BYOPC support: How to troubleshoot before issues emerge
Once the bring your own PC program is up and running, you're going to get help desk tickets -- IT needs to be prepared to handle BYOPC support when issues arise.