<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=308252&amp;fmt=gif">

{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Upgrading Office IT Networks: Planning For Future Growth In BYOD

by Picture of John Ciarlone John Ciarlone on January 30, 2014

There are probably few more hotly-debated issues in business IT solutions today than theit network question and\or problem of Bring-Your-Own-Device (BYOD) policies at work.

The short version is, workers are bringing their personal mobile devices to work, and expecting to use them. In fact, this tends to happen whether a company has explicit BYOD policies, or even if they forbid outside devices. Once workers are accustomed to using a smartphone or tablet part of their workflow, they strongly resist giving it up.

Short on time? Download our Free guide to successful BYOD deployment 

BYODBenefits of BYOD for Your IT Network

  • Workers are using the devices they're familiar with, boosting productivity and decreasing training time.

  • Their options for on-the-go work and telecommuting are vastly expanded, especially when combined with Cloud-based collaborative document hosting.

  • Your business isn't on the hook for purchasing mobile hardware for your workforce, especially since it will just be antiquated in a couple years anyway.

  • In the event of computer or server problems, their mobile devices may serve as “backup” work devices, since they're independent and usually have batteries that are good for several hours.

  • Customers enjoy more options for getting in contact with employees they need, boosting their satisfaction.

  • Worker morale has been shown to go up significantly in a BYOD environment.

On the other hand, there are significant and worrisome problems that BYOD creates, especially when it comes to security.

Planning A Safe Environment For BYOD Policies

1 – Clarify lines of responsibility.

Someone in your operation has to be responsible for setting and clarifying policies on acceptable device usage. This is often the Chief Information Officer, but there needs to be a single person responsible for crafting these policies. Their recommendations can then guide future hardware purchases.

2 – Kick off “rooted” or “jailbroken” devices.

Called “rooting” on Android and “jailbreaking” on iOS, the basic idea is still the same: The user deliberately implements software that cripples or removes low-level security protocols that lock them out of their device's hardware. This gives them the ability to install software that hasn't been certified for their device, for example, or to manually change which cell phone carrier it's using.

While useful for power users, this is simply too dangerous to be allowed on most business networks. Once a user starts fiddling with the basic security on a device, you'll never be able to trust that it's secure enough for your network.

3 – Implement a system with unified security.

A modern unified communications-ready network is practically a requirement when dealing with BYOD. A distributed network, such as one created through ADTRAN's BlueSocket standard, has totally standardized security policies which are implemented at every access point.

This distributed security system makes it far easier to ensure every device connecting to your network has to run and use the same security protocols. It also sbyod tandardizes access, preventing problems where someone's iPad can connect to Router A, but not Router B.

4 – Invest in secure Cloud data systems.

The other major security problem related to BYOD is when employees start uploading company data to private Cloud servers, such as DropBox. While most employees do this simply to help their own productivity, you have no control over how these outside companies implement security.

A business-grade Cloud service that allows universal document access is just what you need here. By giving workers an official and certified Cloud platform, you can then ban services like DropBox without decreasing productivity.

BYOD Is Probably Here To Stay

While it may be too early to say for certain, it appears that BYOD is probably not going to go away. There are too many advantages for everyone, and it's too difficult to outright ban the practice. Smart hardware investments can mitigate the security problems that BYOD creates, while reaping all the benefits it brings to your workers.

Or for more advice, just ask and we'll usually get back to you within fifteen minutes!  

 

Topics: BYOD, Networking, Wireless

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2