BYOD Harvard Case Solution & Analysis

Introduction

Bring your own device (BYOD) is also called bring your own technology (BYOT). The idea behind this concept is to actually allow the employees of the company to bring their own model device, which includes the tablets, laptops and Smartphones that can be used to access the privileged company information and different applications (M. Eslahi, 2012, 262).

This phenomenon enables the company to allow its employees to use BYOD. Along with this, BYOD has been making quite significant loss in the modern business world. More than 75% of the employees in the high growth markets, which include Russian and Brazilian and other customers comprising around 44%, have already been using their own technologies at work.

Moreover, it has been observed as per the latest research that businesses have been unable to stop employees from bringing personal devices at the work. Furthermore, as per the research, it has been confirmed that at least one personal device has been used by employees at work (Madden, 2013, 90).

1.2 BYOD Security

In the modern era, employees are mostly expected to use their respective Smartphones and other mobile devices at work, which has made BYOD’s security a huge concern for the Information Technology teams working for respective teams. Most of the organizations that have been allowing employees to use their own smartphones at work are asked to implement a BYOD security policy, which would clearly outline the company’s position and the governance policy to help and also to support the information technology department to further enhance and also to manage the respective devices while ensuring that the network devices are not actually compromised by the employees using the own devices at work.

BYOD’s security is included in the information technology, which would provide a detailed security requirement for each type of personal device that would be used at the workplace and also it would be connected to the corporate network (ACMA, 2013).

For instance, information technology may also require devices to be configured through passwords and the different types of applications, which are installed on the respective device to be encrypted. Along with this, other different BYOD security policy initiatives have also been limiting activities, which help employees to perform devices at work.

It has been observed that all the companies focus on keeping its internal details, security, and different aspects under control so that the confidential information of the company is not exploited by the employees using BYOD.

Although it is a fact that the concept of BYOD allows the employees or the staff to work at anytime from anywhere to serve the needs of the firm, however, in spite of the major efforts, which supports the concept of BYOD, there are some challenges associated with it as well (M. Eslahi, 2012, 262).

With all the efforts, which ensure that the concept of BYOD is a successful one, it also has some issues that are directly related to data theft and security of the company data. Therefore, it is elementary on the part of the firm to ensure that the companies put security measures in place.

 1.3 Current challenges facing the ICT professional

The current challenges faced by ICT professionals with the excess use of BYOD have been an element of risk for the ICT professionals. Since they are the people who actually ensure the security of the highly confidential data therefore, it becomes a cause of concern for the ICT professionals to maintain a balance between the two aspects.

The major issues of BYOD security have been strongly related to the end node problem where a specific device is used to access both the sensitive and also the risky network risk adverse organization issues.BYOD Case Solution

ICT professionals have been aware of the fact that end users are embracing it and the vendors have been trying to market it. The concept or the ideology of BYOD has been bringing transitioning market orthodoxy.

ICT professionals have the responsibility of ensuring successful implementation of security check and balance at the team working as ICT professionals do not have to only  look after the internal matters of the information technology department, but in fact they also have to overcome the issues caused by BYOD. Although it is a fact that BYOD itself does not actually constitute for a generic technology, it has been driven by a multiple of technological trends (Morrow, 2012, 05).....................

 This is just a sample partial case solution. Please place the order on the website to order your own originally done case solution.

Share This

SALE SALE

Save Up To

30%

IN ONLINE CASE STUDY

FOR FREE CASES AND PROJECTS INCLUDING EXCITING DEALS PLEASE REGISTER YOURSELF !!

Register now and save up to 30%.