Managing the BYOD Trend

Today, whether the mobile device was purchased by the company or the employee, it is being used or both personal and professional matters. Compared to laptops, mobile devices are particularly vulnerable because they really go everywhere – from the beach to the gym to the nightclub. They are often used by other people, including children who can unwittingly change settings that increase vulnerability. Many mobile devices were designed as consumer gadgets, without proper security in mind. As a result, the risk of data leakage and attacks on the corporate network are on the rise.

When it comes to personal devices, security solutions must meet the needs of both the organization and the employee. For the organization, a complete solution must provide security, access control, manageability, and compliance. From the employee perspective, traditional device management solutions are too intrusive and give too much control to the enterprise. Solutions that use secure containers are inconvenient, involving separate applications or environments for corporate information. As a result, employees are less than cooperative, and any security methodology is worthless if not willingly adopted.

Last but not least, with the proliferation of mobile devices, the price of security is a serious concern. Corporate IT needs mobile security solutions that are cost-effective and simple to implement and manage.


LetMobile for BYOD

LetMobile provides an effective solution for securing corporate email and documents that:

  • Lets employees connect easily over a secure channel without the need to organize certificates and VPN settings
  • Supports all current and future mobile devices
  • Protects corporate Email, attachments, calendar and contacts from leakage
  • Enforces corporate and regulatory policies
  • Removes barriers to adoption by enabling employees to use the native mail apps on their device – without handing over control of the device, without installing a new environment
  • Reduces the costs of rolling out and managing a BYOD program. Low license costs, unlimited number of devices per licensed user, low cost of deployment, very low cost of management compared to any device-centric approach, and substantially reduced mobile data usage bill


Best Practices for BYOD

A successful BYOD program is more than software – it depends on setting the right policies for your organization and employees. As the start of a new BYOD initiative, address the following questions:

  • Decide which employees will join the program, for example, based on risk levels. Consider dividing employees into several groups for a staged rollout.
  • Define the devices that will be allowed to participate: vendors, operating systems
  • Define device restrictions against practices such as jailbreaking and rooting
  • Set policies for reading mail by geography, content, time periods and more
  • Set up support practices: Help-desk, self-service, peer-based
  • Organize training and education for employees
  • Finalize a rollout schedule