BYOD: Bring your own distraction

It’s all the rage.  There’s not much to add.  Everyone has a solution to it, even Novell  So, what is there useful to say?

Only this.  Think about BYOD policies and be consistent.  Do you ban people from browsing porn on their own tablet?  Do you pay people for the hardware? Or do you expect people to fund their own IT? Who provides insurance?

Run a pilot.  Here are some requirements to think about.

  • Container for corporate data
  • Control of password complexity
  • Encrypt whole device
  • Enforce policies
  • Full alerting
  • Full logging
  • Full reporting
  • Hierarchical administration
  • Limit to OS version
  • Locate device
  • Log web sites visited
  • Login time out
  • No jail breaks
  • Remote control of device
  • Remote wipe or device or data
  • Screen clear timeout
  • Separate administration by business units

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s