BYOD and BYOT Security Implications

1874 Words4 Pages

Introduction

The constantly increasing portability, and plummeting prices of

powerful mobile computing devices have popularized a trend known as

BYOT (Bring your own technology) policies, also known as BYOD(bring

your own device), and in some quarters as BYOP (bring your own phone)

[1]. While the trend has been around in one form or the other in the

past two decades, it has seen a rapid adoption in recent times (Figure

1), [2, 5], and has had a significant impact on several industries. A

recent study carried out by Cisco indicated that eighty nine percent

of IT departments enable BYOT in some form, and sixty nine percent of

IT leaders are “positive” about BYOT [36]. A press release made by

Gartner in 2013 foresees a future in which BYOT practices will not

only be permitted, but required for most enterprises. Dell and VMware

corroborate this report [5, 6, and 7]. However as is common in the

computing arena, new trends often bring with them their own security

issues. While some companies feel the phenomenon is just a passing

fad, there is substantial evidence that indicates otherwise (Figure 2)

[3], and therefore organizations must implement effective strategies

to identify and mitigate the threats posed by the aforementioned

security issues.

In the following sections, the author will aim to provide a clear

understanding of what implementing BYOT policies encompass, their

impact on productivity in enterprise environments, and the security

issues associated with them.

Figure 1. Growth of employee owned devices. [37]

Figure 2 Shift to personnel owned devices in the workplace. [38]

What is BYOT?

BYOT can be described as the practice...

... middle of paper ...

...ons-Global.pdf [Accessed 07 Dec 2013]

[37]Citrix. IT Organizations Embrace Bring-Your-Own Devices: Global BYO Index 2013 [Online] Available from: http://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/it-organizations-embrace-bring-your-own-devices.pdf [Accessed 07 Dec 2013]

[38] Mark Bowker. The Enterprise Strategy Group. The VMware Mobile Secure Workplace 2013 [Online] Available from: [Accessed 07 Dec 2013]

[39] Kevin Johnson and Tony DeLaGrange. SANS Institute. SANS Survey on Mobility/BYOD Security Policies and Practices 2012 [Online] Available from: http://www.sans.org/reading-room/analysts-program/SANS-survey-mobility [Accessed 07 Dec 2013]

[40] Ponemon. 2013 State of the Endpoint 2012. [Online] Available from: http://www.ponemon.org/local/upload/file/2013%20State%20of%20Endpoint%20Security%20WP_FINAL4.pdf p6. [Accessed 01 Dec 2013]

Open Document