BYOD and BYOT Security Implications

1874 Words8 Pages
Introduction The constantly increasing portability, and plummeting prices of powerful mobile computing devices have popularized a trend known as BYOT (Bring your own technology) policies, also known as BYOD(bring your own device), and in some quarters as BYOP (bring your own phone) [1]. While the trend has been around in one form or the other in the past two decades, it has seen a rapid adoption in recent times (Figure 1), [2, 5], and has had a significant impact on several industries. A recent study carried out by Cisco indicated that eighty nine percent of IT departments enable BYOT in some form, and sixty nine percent of IT leaders are “positive” about BYOT [36]. A press release made by Gartner in 2013 foresees a future in which BYOT practices will not only be permitted, but required for most enterprises. Dell and VMware corroborate this report [5, 6, and 7]. However as is common in the computing arena, new trends often bring with them their own security issues. While some companies feel the phenomenon is just a passing fad, there is substantial evidence that indicates otherwise (Figure 2) [3], and therefore organizations must implement effective strategies to identify and mitigate the threats posed by the aforementioned security issues. In the following sections, the author will aim to provide a clear understanding of what implementing BYOT policies encompass, their impact on productivity in enterprise environments, and the security issues associated with them. Figure 1. Growth of employee owned devices. [37] Figure 2 Shift to personnel owned devices in the workplace. [38] What is BYOT? BYOT can be described as the practice... ... middle of paper ... ...ons-Global.pdf [Accessed 07 Dec 2013] [37]Citrix. IT Organizations Embrace Bring-Your-Own Devices: Global BYO Index 2013 [Online] Available from: [Accessed 07 Dec 2013] [38] Mark Bowker. The Enterprise Strategy Group. The VMware Mobile Secure Workplace 2013 [Online] Available from: [Accessed 07 Dec 2013] [39] Kevin Johnson and Tony DeLaGrange. SANS Institute. SANS Survey on Mobility/BYOD Security Policies and Practices 2012 [Online] Available from: [Accessed 07 Dec 2013] [40] Ponemon. 2013 State of the Endpoint 2012. [Online] Available from: p6. [Accessed 01 Dec 2013]

More about BYOD and BYOT Security Implications

Open Document