Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors
Stephen Nardone - Director of Security Solutions and Services

BYOD, Security, and You

Make Sure You Cover All Your Bases


By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

BYOD Security1. You can’t control everything on your employees’ personal devices. But you will have to put a plan in place for maintaining enough control over these devices. Draw up clear, restrictive usage policies.

2. There are 3 application architectures you can consider for managing the new fleet of devices: native mode, browser-based, and virtual mode. Find out which approach will work best for your organization—many organizations are now using a hybrid of native mode and virtual mode.

3. Since employee-supported devices will now contain a combination of personal and business data, you’ll need to outline a very clear End User Agreement (EUA). Be absolutely clear what the employee can and cannot do with their device when it is connected to your organization’s network.

4. You’ll also need a plan for handling lost or stolen devices. What types of data will likely be stored on employee-owned devices? Make sure to include plans to mitigate unauthorized access and data loss into your overall strategy.

5. In order to manage, track, and secure mobile devices you will need an MDM (Mobile Device Management) tool to ensure corporate polices and security are in place on every device. Most importantly, an MDM tool will allow you to delete corporate data if the phone is lost or the employee leaves the company. Depending on the MDM tool you choose, there are lots of other options and control functions you can use to get the most out of your mobile devices and BYOD environment.


For more in-depth information on implementing security policies for your BYOD strategy, take a look at our solutions story.

For more than 30 years, the Connection family of companies has been trusted to provide and transform technology into complete solutions. For more information, drop us a line.