Your BYOD Policy: Key Considerations, Daren Goeson, SVP Product Management, SUEM
See more insights into creating effective and secure BYOD policies in Ivanti’s research report: Secure Unified Endpoint Management.
Daren Goeson, SVP Product Management, SUEM at Ivanti explores the essential factors organizations should consider when creating Bring Your Own Device (BYOD) policies and protocols. From use cases to data management, device compatibility to security implications, this video provides valuable insights to help organizations develop effective BYOD strategies.
As more employees' express preferences for working on their personal devices, IT and security leadership must implement comprehensive policies and protocols around BYOD.
Your BYOD policies, strategies and technology solutions should clearly address the incremental security risks and aim to avoid unmanaged BYOD and the use of shadow technology. Key considerations covered in this educational video include:
· Use cases and eligibility
· Data management and privacy: policies should define which applications can be accessed and the depth of network access allowed.
· Device compatibility: compatible operating systems and compliance with standards are essential to minimize support issues.
· Security risks: personally owned devices should be considered unmanaged and untrusted, posing a higher risk of data loss, credential exposure, and malware.
· Technical enablement: enrolling BYOD devices in Mobile Device Management (MDM) systems provides a level of management and security while allowing personal use.
By understanding the use cases, managing data and privacy, ensuring device compatibility, addressing security implications, and enabling BYOD from a technical perspective, organizations can create effective strategies that balance productivity, security, and user satisfaction.
0:00 - BYOD & Implications
2:21 - Enabling BYOD & Security