SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
There are two technologies in particular which
   are in themselves becoming integral to IT
     operations and that are subsequently
   supporting the growth in BYOD - they are
cloud computing and Virtual Private Networks
  (VPNs). Whilst there are many technology
trends that are pushing the adoption of BYOD
 policies, these two are providing businesses
   with the key tools they need to overcome
   some of the challenges that BYOD brings
                     with it.




cheap hosting
Connectivity and Interoperability The key to BYOD's success is
also one of its biggest hurdles and that is the variety of devices and
platforms that it introduces into the IT systems equation Users will be
hoping to connect from a broad range of devices such as laptops, tablets
and smartphones, running all manner of operating systems including the
more traditional Windows, Mac OS and Linux alongside the newer kids
on the block in the mobile sphere: iOS, Android, Windows Mobile and
Blackberry for example For organisations where the workers need to
connect to the local network, VPN is the key Tunnelling into a local area
network across a VPN can allow users to access the files and/or control
the applications on local (office) machines that they need for their daily
work regardless of the device they are using, and their location, as long
as they have an internet connection
Although many applications have releases which support most
operating systems it can be a real headache rolling out an application suit
across such a variety of platforms However, the all-conquering concept
of cloud computing can offer a truly interoperable application solution
More specifically Software as a Service (SaaS) offerings, such a Google
Docs or Microsoft Office 365, together with cloud storage, allow workers
to operate within the cloud and therefore seamlessly between the office
and on the go Again, the only condition to use these services is that the
user has an internet connection
Security Arguably the greatest challenge faced by organisations
embracing BYOD is that of security; ensuring that personal devices
aren't compromised in themselves and don't pose a security
threat to the rest of the network Allowing BYODs introduces many more
vulnerabilities at various steps in the network and so there are many
ways in which these risks can and need to be addressed The first step
is to reduce the risk of the personal device being compromised in the first
place
This is particularly pertinent where employees are bringing their own
device in to connect to the businesses LAN To achieve this, some
organisations have conditions of use which require that the user's
device has specific anti virus and management software installed before
it can be allowed onto the network However, the risks can also be
reduced by ensuring that personal devices are only allowed to connect to
the local network via a VPN rather than a direct connection, even when
the user is on site
Using a VPN is a must for users in remote locations as the secure
tunnel of a VPN prevents any information being intercepted in transit It
can be tempting for employees working off-site (or even on site) on
personal devices to email documents, for example, backwards and
forwards but the security of such communications can never be
guaranteed What's more that approach requires that at least
some work data is stored locally on the personal device - a cardinal sin in
terms of data protection
Again both VPNs and cloud solutions can negate the need to store local
data Using a VPN will allow the worker to operate on the local network,
accessing, working on and storing everything they need on there, rather
than on their own device Secure cloud services on the other hand can be
used to provide collaborative workspaces where users perform all their
work in cheap hosting the cloud so that colleagues, wherever they are,
can access it
However care should be taken to check the security measures used by
cloud providers before signing up to such services whilst the user must
also ensure that someone who misappropriates a device can't then
easily access their cloud account (through lack of device security and
stored passwords etc) All this, plus implementing measures such as
improved secure wireless networks in the work place, may result in
greater spending on IT security and connectivity, but this should, as
mentioned above, easily be offset by the direct and indirect financial
benefits experienced elsewhere across the IT budget and the business
as a whole
cheap hosting

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

There-Are-Two-Technologies-In-Particular-Which-Are83

  • 1. There are two technologies in particular which are in themselves becoming integral to IT operations and that are subsequently supporting the growth in BYOD - they are cloud computing and Virtual Private Networks (VPNs). Whilst there are many technology trends that are pushing the adoption of BYOD policies, these two are providing businesses with the key tools they need to overcome some of the challenges that BYOD brings with it. cheap hosting
  • 2. Connectivity and Interoperability The key to BYOD's success is also one of its biggest hurdles and that is the variety of devices and platforms that it introduces into the IT systems equation Users will be hoping to connect from a broad range of devices such as laptops, tablets and smartphones, running all manner of operating systems including the more traditional Windows, Mac OS and Linux alongside the newer kids on the block in the mobile sphere: iOS, Android, Windows Mobile and Blackberry for example For organisations where the workers need to connect to the local network, VPN is the key Tunnelling into a local area network across a VPN can allow users to access the files and/or control the applications on local (office) machines that they need for their daily work regardless of the device they are using, and their location, as long as they have an internet connection
  • 3. Although many applications have releases which support most operating systems it can be a real headache rolling out an application suit across such a variety of platforms However, the all-conquering concept of cloud computing can offer a truly interoperable application solution More specifically Software as a Service (SaaS) offerings, such a Google Docs or Microsoft Office 365, together with cloud storage, allow workers to operate within the cloud and therefore seamlessly between the office and on the go Again, the only condition to use these services is that the user has an internet connection
  • 4. Security Arguably the greatest challenge faced by organisations embracing BYOD is that of security; ensuring that personal devices aren't compromised in themselves and don't pose a security threat to the rest of the network Allowing BYODs introduces many more vulnerabilities at various steps in the network and so there are many ways in which these risks can and need to be addressed The first step is to reduce the risk of the personal device being compromised in the first place
  • 5. This is particularly pertinent where employees are bringing their own device in to connect to the businesses LAN To achieve this, some organisations have conditions of use which require that the user's device has specific anti virus and management software installed before it can be allowed onto the network However, the risks can also be reduced by ensuring that personal devices are only allowed to connect to the local network via a VPN rather than a direct connection, even when the user is on site
  • 6. Using a VPN is a must for users in remote locations as the secure tunnel of a VPN prevents any information being intercepted in transit It can be tempting for employees working off-site (or even on site) on personal devices to email documents, for example, backwards and forwards but the security of such communications can never be guaranteed What's more that approach requires that at least some work data is stored locally on the personal device - a cardinal sin in terms of data protection
  • 7. Again both VPNs and cloud solutions can negate the need to store local data Using a VPN will allow the worker to operate on the local network, accessing, working on and storing everything they need on there, rather than on their own device Secure cloud services on the other hand can be used to provide collaborative workspaces where users perform all their work in cheap hosting the cloud so that colleagues, wherever they are, can access it
  • 8. However care should be taken to check the security measures used by cloud providers before signing up to such services whilst the user must also ensure that someone who misappropriates a device can't then easily access their cloud account (through lack of device security and stored passwords etc) All this, plus implementing measures such as improved secure wireless networks in the work place, may result in greater spending on IT security and connectivity, but this should, as mentioned above, easily be offset by the direct and indirect financial benefits experienced elsewhere across the IT budget and the business as a whole