BYOD is more than e-mail access

Sep 7, 2016 | Cloud | 0 comments

A data-centric approach can enable a “Bring Your Own Device” policy. While companies may supply senior staff with a smart phone, more and more employees want to tap into work on their personal devices. So much so that Tech Pro Research reports 72% of companies will support a BYOD policy by the end of this year.

And half of employers actually will require BYOD by the end of the year, according to Gartner.

While corporate phones used to be focused on e-mail, those needs have morphed as phones and tablets have become more advanced. The usage of Cloud apps to access data, programs and other tools has increased.

Protect the data that matters.

The key is to keep the important data on platforms that have strong access controls and auditing, are user-friendly and meet your security framework. If a solution isn’t provided, employees will find one. And that choice isn’t likely to meet IT or Security standards.
Not choosing is absolutely making a choice.

Of course, the right solution will vary by business use case and need, but a strong mobile-accessible file share platform is vital for enabling employees to access data on the go. ASMGi expanded its BYOD policy in 2016, and a big reason for that was the high adoption of our secure file platform in house (We use Box.) We have helped other companies implement, connect and achieve high adoption rates as well.

Some important things to keep in mind when selecting a file-sharing platform:

  • Companies need easy, secure access to content to adhere to employee needs and tech advancements
  • Use cases are important. Employees will bring in iOS, Android or Windows devices (computers, tablets and phones) to work and collaborate. Make sure the file types are supported.
  • Users need to access the right information at the right time
  • The business needs to be able to see who is accessing data and restrict access to sensitive data as appropriate (or required)
  • You should have a clearly defined BYOD policy that includes the platform
  • Companies should be able to wipe company information from devices if there is a separation, just in case they circumvented the approved tool

In the end, it’s important to start with the needs of business and facilitate those use cases by enabling employees to be productive in secure and efficient ways.

View/Add comments

<script type="text/javascript" src="//"></script><script type="in/share" data-counter="top"></script> <a href="" class="twitter-share-button" data-via="ASMGi_CLE">Tweet</a> <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^https:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);;js.src=p+'://';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script>

Related Posts

Navigate the blog