BYODs Issues, Risks, and Security – How to tackle It?

BYODs Issues, Risks, and Security – How to tackle It?
Rate this post


Disaster happens when it comes to Technology. Protecting data is necessary before you become a victim of device theft.

One of our clients had lost his device while he was travelling to the USA. He was very upset as his device was lost along with all his important business data.

By 2018, 70% of workers will be using personal smart devices at work, predicted by Gartner.

Whenever you lose your device, you feel helpless with the sheer terror of thinking that you might have lost all your contacts, photos, client’s data – everything related to professional and personal life.

The good news is you can take precautions against unwanted situations. There are uncountable number of mobile applications, protecting data and can even help to retrieve it, if your business-cum-personal device had been stolen, or lost.

Gartner says;

“BYOD does increase risks and changes expectations for CIOs (Chief Information Officers). Unsurprisingly, security is the top concern for BYOD. The risk of data leakage on mobile platforms is particularly acute. Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.”

Related: Going from BYOD to WYOD

When managing BYOD security, you have to consider many issues across your organization, such as:

  • Create policy about apps that can and can’t be installed to any device preventing possible attacks from malware. You should create a blacklist of applications that employees shouldn’t install on their phones.
  • Every mobile to be tracked can increase privacy issues where Bring Your Own Device is concerned. There are some employees wishing their location not to be chased and monitored when not at work. But, businesses want to know where each device is. With geofencing setting parameters, the device will be monitored during office hours only.
  • It is much important to track usage of device to manage the cost. Moreover, device could be used for personal as well as business call and data exchange.
  • The entire philosophy behind BYOD is that employees can choose their own device to use for work. But, for security purpose, you have to ensure to avoid using jail-broken phones or any other device that hasn’t authorized. Your security policy must have a list of device that are approved.


Is there any way to defense Intelligently?

Devices that are used by employees have an essential level of security. The high-authority of businesses, i.e. IT managers and CIOs have to look at how their current security policies can be modified to maintain high levels of data security with BYOD.

Mobile Application Management (MAM) – The best Solution to control the data in a mobile environment.

MAM is one of the most adopted strategies that connects with the enterprise app development stores. It’s main aim to concentrate on enterprise resources on managing a business, its data by taking the application in control. On another side, the application can also access the data while employees being in control of devices they have.

MAM enables a business to order encryption, set and enforce role-based policies for apps, including how they store and share documents and even remove data and prevent access to apps when an employee leaves the company.

Ensure that sensitive data never leaves your CRM apps without preventing employees from playing Candy Crush on their own devices during their own time.

Whether to manage or not to manage – when it comes to BYOD, this is the first thing every enterprise ask.

How much management of user-owned devices connecting to corporate resources does the company want to be connected in?

This question seems to be critical, as the degree to which an enterprise is connected in managing different factors of user-owned mobile devices has significances.

For e.g.: A predicted advantage of implementing BYOD is no longer having to fully manage employees’ mobile devices. Contrary, support costs are hopefully reduced.

Additionally, fully managing user-owned devices results in interfering on the personal use of those devices that goes beyond the corporate data and resources on them. Such might have device-level authentication and encryption policies with a complete device remote locking or wiping user’s’ personal content.

How will business related applications and email access be delivered to user-owned devices?

It is fact that a BYOD program loses its charm when adequate access to such apps and corporate resources are not provided to them. Here, businesses have to take considerations about where the apps and resources will be hosted and how the company will make sure that only the proper resources for each user based on the particular requirements and permissions are made accessible to them.

Now, a million-dollar question arise.

How will the corporate apps, including email access, remain secured once they are on user-owned mobile devices and what will happen when employees leave their job?

Giving access to business-related apps and corporate resources to BYOD is the only first part of the equation. Here, the real issue is to maintain the security of those resources and data without delaying users experience with their personal devices.

Comparison of different companies, providing MAM:

  BlackBerry DELL Space-O Technologies IBM Microsoft Technologies
Cloud Yes Yes Yes Yes Yes
On-premises In Market Preview In Market Preview Yes Yes Hybird
Perpetual Licensing Yes (inc. w/base license) NO Yes Yes




Recurring Licensing Yes (inc. w/base license) Yes Yes Yes Yes
Android 2.3+ Yes 2.3+ Yes Yes, OMA-DM, EAS and SAFE
iOS 5.0+ Yes 6.0+ Yes Apple API
Windows Phone NO (WP 8.0 for BES 12) NO WP 8+ Yes OMA-DM
Windows OS NO Yes Vista+ Yes OMA-DM
MAC OSX NO Yes OSX 10.6+ Yes Yes, via System Center Config Mgr
Other NO None Windows XP, 7, 8 N/A
Apple App Store Yes Yes Yes Yes Yes
Microsoft App Store No (Planned for BES 12) No Yes Yes Yes, Windows Store and Windows Phone Store
Google Play App Store Yes Yes Yes Yes Yes
SDK NO NO Yes Yes Yes, via System Center Config Mgr
Enterprise App Store Yes Yes, app distribution OS dependent Yes






App Containerization Yes Yes Yes Yes Yes
App Wrapping Yes No


Yes Yes




App whitelisting / blacklisting Yes Yes Yes Yes Yes
Disable copy / paste in apps Yes Yes Yes Yes Yes
Disable copy / paste in email Yes Yes Yes Yes Yes
App inventory tracking Yes Yes Yes Yes Yes
App compliance tracking Yes Yes, OS dependent Yes Yes Yes
app version management Yes Yes, OS dependent Yes, OS dependent Yes Yes
App config mgmt Yes Yes, OS dependent Yes Yes Yes
User & grp access control Yes Yes Yes Yes Yes
App-specific VPN or Micro VPN NO Yes, OS dependent Yes Yes Yes
Reauthentication Yes NO Yes Yes Yes
Maximum Offline Hours Yes Yes Yes Yes Yes
Required Enterprise Logon Yes Yes Yes Yes Yes
Erase App Data on Lock Yes Yes Yes Yes Yes
Self-service app store Yes No Yes Yes Yes
Help desk Yes No Yes Yes Yes
Multi-user support NO Yes Yes Yes Yes
Multi-language support Yes(mobile client) No Yes Yes Yes
Web-based admin console Yes Yes Yes Yes Yes
App-level analytics No Yes, OS dependent Yes Yes Yes
App performance monitoring NO NO Yes NO NO
Push services Yes Yes Yes Yes Yes
Reporting & tracking Yes Yes Yes Yes Yes

Evaluating Overall Scenario

The use of tablets, smartphones and phablets are going to increase gradually and thus, it creates more pressure on IT to implement a workable BYOD strategy. That means IT must adopt mobile app development tools to BYOD strategic vision into an effective reality.