BYOD and the rules of the game
For now, the standard model whereby employees work on mobile devices provided by the employer still prevails in Czech companies. However, it’s not very comfortable for anyone to carry both a company and a personal phone with them; what’s more, being able to choose their own device offers the employee more comfort in terms of its operation. Then there is also the fact that it’s relatively common to invest more money in one’s own device than an employer would invest in one.
Thanks to the BYOD solution, companies enable their employees to access company data from their own devices anytime, anywhere. In this way, they increase employee productivity and satisfaction, but on the other hand the company data must be properly secured and protected, and the mobile devices must be managed collectively.
In order for BYOD to function correctly, rules must be set which precisely define the boundaries within which the specific user can operate. On the other hand, the company is also obliged to provide compensation to the employee for the use of their own device for work.
The employer must also pay due attention to the protection of personal and sensitive data contained in personal devices – company data must therefore be strictly separated from personal data on the mobile devices.
Solution for the bulk management and securing of mobile devices using VMware AirWatch technology
The VMware AirWatch technology supports all main mobile platforms, which means that employees can choose their devices from the latest brands and models.
Thanks to AirWatch Agent, the process of registering a mobile device is simple and smooth. As soon as the user is verified, the profiles, applications and content are set automatically according to user and device ownership type. AirWatch therefore enables secure access to company data from both company devices and devices owned by employees. With the help of the AirWatch self-service portal, employees can perform basic management of their devices themselves, which makes the IT department’s work considerably easier.
With the help of the AirWatch container, it’s easy to separate company and personal data on devices, using ones own privacy protection principles according to device ownership type. The configured principles prevent the collection of data from personal e-mail accounts, content and applications on devices owned by employees. GPS localization, personal user information and telecommunication data also remain private with the setup.
Organizations need to allow a BYOD policy without endangering IT security. AirWatch Workspace provides security for corporate resources and applications delivered on the device, while at the same time preserving the division of company and personal data.
It’s also possible to control and manage company applications and data without having to manage the entire device. The container solutions from AirWatch are designed to ensure user-friendliness, with single sign-on capabilities and integration across the container repository. User verification, data encryption, application level principles and monitoring and management of conformity (compliance) ensures advanced security for applications throughout the entire company.
If the user loses the device or terminates their employment, the administrators will prevent access to the company e-mail account, Wi-Fi and VPN; the same applies for internal applications and corporate content, without affecting the personal content on the device.
System4u offers comprehensive processing of the issue surrounding BYOD:
- technical part– analysis of current state, preparation and design of IT policies for various user groups
- legal standpoint in relation to the BYOD issue– analysis of rights, obligations and risks
- preparation of an internal BYOD directive – rules for the use of own devices by employees and external workers
- user manual, including the issue of privacy protection
Before introducing a BYOD solution in the company, it is necessary to consider all the aspects in advance; only with a properly thought-out procedure and solution can perfect functioning be achieved. Thanks to a properly set up BYOD policy, sensitive company data will remain secure, the IT department is not at risk of being overloaded, mobile devices end users will be happier, and their work performance may increase considerably.