Bring your own device (BYOD), where employees choose and buy a device to use at work, continues to trend upward in some industries. But in the retail sector, according to Forrester Research, 68% of IT decision-makers are not interested in enabling employees to bring their own PCs to work.Â
However, with BYOD already in place, you may have seen benefits such as:Â
Reduced capital expenditures on buying, maintaining and upgrading hardwareÂ
Happier users who want the freedom of choice to work on their favorite devicesÂ
Hopefully, you’re also addressing some of BYOD’s challenges, including less control over company data, and greater risks from the loss or theft of devices.Â
Restrict BYOD to SmartphonesÂ
Consider the following points to balance user choice and flexibility, with optimal security and efficiency:Â
Where possible, restrict BYOD to user-owned smartphonesÂ
Embrace an enterprise mobility management platform such as MobileIron to simplify the management of endpoint devices or mobile device management (MDM) solutions like Microsoft InTune.Â
Restrict access only to specific IT-approved applications behind the firewall (in the office) to limit malware risk.Â
Evaluate whether a cloud access security broker (CASB)Â agent-less solution can give you better data visibility and control than your MDM suite.Â
Offer Employees a Choice of Company-Owned DevicesÂ
Beyond smartphones, all end-user devices could be company owned and managed by IT under a program where you offer employees a choice of devices. In this way, not only do users get choice, but your organization still benefits from the enhanced security features and common productivity standards found in business-grade devices like ThinkPad and ThinkCentre.Â
Consider business-grade devices with the highest level of build quality, support services, security features and connectivity options. For example, access prioritized tech support and on-site servicing. Or achieve the highest security standards with hardware-based fingerprint readers which are much harder to hack.Â
Audit job roles in your organization to get user input on preferred device types. Today there are many types of devices available, each with their own advantages for different worker roles. Gain user buy-in ahead of time to ease the transition to your new program.Â
Simplify PC deployment with a solution like Advanced Deployment Services. This is a customizable self-install wizard that enables final configuration steps to be performed by your end users instead of a technician. Whether joining a domain, installing software, setting up printers or migrating data, you can empower your end-users to self-serve and reduce the burden on IT admins.Â
Use Windows 10 Pro security features to help protect data in the event of a human error or if a device is lost or stolen. For example, Windows Information Protection helps prevent unauthorized or accidental sharing of company information and allows you to remotely delete business data from a lost or stolen device. BitLocker data encryption, supported by many ThinkPad and ThinkCentre devices, will encrypt all data on a device, ensuring it cannot be accessed by unauthorized users.
"Allowing staff to handle corporate communications from their BYOD devices means more network segmentation and a greater focus on network access control."Â
IngramMicro Advisor