Mitigating the risks of BYOD with mobile application management

10.09.2012
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

is the latest technology trend nipping at the heels of nearly every CIO and CISO. But make no mistake, it is more than just a buzzword; it is a true movement.

The concept is simple: Allow employees to supply their own devices, thereby increasing employee satisfaction and . Generally, and especially for the purposes of this article, the "device" in BYOD refers to mobile devices, particularly and tablets.

IN DEPTH:

For all its potential benefits, BYOD is without a doubt not the right mobile strategy for every employee in every organization. For that matter, BYOD might not be the right approach for some organizations altogether; the benefits might simply not exist in certain use cases. Also, BYOD does involve relinquishing at least some control over the devices connecting to corporate networks, resources and data. As always, there are concerns when relinquishing any such control.

That said, the concerns surrounding BYOD are much like those involved with driving a car. Are there potential hazards involved with both? Of course there are, but can those hazards be mitigated? Absolutely! In both cases, preparing for the various hazards by being properly equipped with appropriate protections and tools enables one to reap the benefits of these activities without getting banged up.