Posts Tagged ‘Bring Your Own Devices’

*Editor’s Note: This column originally appeared in TechTarget’s

Question: Our remote workers are entering the workplace with their own mobile devices and want to connect to our corporate resources. I want to allow them to do this, but before I do, I want to know the biggest risks of BYOD.

The biggest risks for enterprises that allow bring your own device (BYOD) environments are control and privacy. Deploying and enforcing security controls is typically more difficult on personal devices for two reasons. First, ownership of the device establishes a control mentality from the owner’s point of view. Second, restrictions on personal data or content, in general, are more difficult to argue from a BYOD policy standpoint. The most critical aspect is that companies must ensure they observe the protection of the users’ personal identifiable information (PII).


We recently asked readers from where they most often remotely connect to their corporate servers. Hotels took in over 43% of the vote, followed by cafes and restaurants with 22%. Votes were split 13% each on connecting from tradeshows and en route transportation, like airplanes, buses and trains. But from these places, we’re curious, which presents the biggest remote access problem? For instance, do you avoid remote access from hotels because your VPN gets blocked? Is the constant switch from connection to connection while in airports too unwieldy to handle? Let us know which remote access locations give you the biggest headaches – and feel free to elaborate in the comments.

We’re here in Las Vegas, taking in the spectacle of Interop‘s 25th anniversary show. With more than 350 exhibitors and roughly 14,000 attendees — this year’s show is a dizzying array of product announcements, demos, and industry chatter. We had the opportunity to have a poolside chat with Cliff Cibelli, Managed Mobility Principal, at Verizon about the role that VPNs are playing in Verizon’s initiative. At the show, Verizon also announced an expanded agreement with SAP to jointly market Verizon’s Managed Mobility Platform.

VPN Haus: What role has “Bring Your Own Device” policies and the overall trend of personal devices becoming corporate-liable played in Verizon’s Managed Mobility Initiative?

Cibelli: If you take a look at almost any enterprise – or any CIO that I’ve spoken to — they all want to take a look at a “Bring Your Own Device” policy, because it doesn’t make sense for them to pay $70/month to a carry a device – especially because [employees now] probably carry a personal device that is extremely more powerful. If I’m going to spend the money to develop productivity-enhancing applications, I want to do it on a device that’s more sexy and attractive, like an iPad or a Zune tablet. That’s what Managed Mobility is about – taking those devices enhancing them and putting applications on them to give users access to their information, regardless of where it sits. It’s taking that big pile of data that might be sitting in a SAP infrastructure and turning it into actionable information that a sales rep can use.

VPN Haus: How are you approaching VPN for this?

Cibelli: So we take this from an enterprise perspective and look at the technologies that they want to adopt. Then, we look into how we can configure that client based on the enterprise’s wish and put it on the device.

VPN Haus: What trends are you seeing in VPN technology?

Cibelli: Over time, we’re seeing the trends in VPN technology becoming more prevalent on these devices, especially because most of these devices have both 3G and the coming 4G capabilities, as well as Wi-Fi capabilities. This means looking into tools that allow session persistency and maintaining that session on that backend as you may move from a 3G or 4G connection into a Wi-Fi type connection…And certainly, 5 GB of 4G access may be great. But if you consider the personal aspects of these devices, if I can quickly download a movie, I can eat up that data really quickly. So the ability to start taking a look at developing clients that can actually do that, in conjunction with VPN technologies to gain access to that corporate information across different spectrums of bandwidth, is increasingly important.