in ,

Lisa Durant: IT Should Base BYOD Policies on Users, Device, App, Content

Lisa Durant: IT Should Base BYOD Policies on Users, Device, App, Content - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

mobilityLisa Durant, a research analyst at Nemertes Research, says information technology companies that adopt bring-your-own-device programs should develop policies for the applications, content, users and their devices to protect the organization from data leaks.

Durant wrote in a piece published Monday on AT&T‘s Networking Exchange Blog that administrators should cover these factors in their approach to help facilitate user flexibility and information security.

The program’s user coverage, users’ level of access and authorized device users beyond employees should be included in policies for user groups and mobile devices, Durant says.

She adds that IT leaders should also choose between mobile device management and mobile application management programs based on what works best for the company’s needs.

MAM includes application security measures such as application wrapping, secure container and virtual desktop infrastructure.

Finally, Durant notes that administrators also need to consider the different types of devices and their respective functions for content when they develop acceptable-use policies.

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Mobility

mm

Written by Anna Forrester

Alistair Rennie: IBM, CPSI Partner for Predictive Healthcare Analytics Project - top government contractors - best government contracting event
Alistair Rennie: IBM, CPSI Partner for Predictive Healthcare Analytics Project
SGI to Resell Seagate's ClusterStor Appliances; Jorge Titinger Comments - top government contractors - best government contracting event
SGI to Resell Seagate’s ClusterStor Appliances; Jorge Titinger Comments