With the rise in the consumer electronics market one can see more electronical devices and options are becoming available to the consumer population. Therefore this can lead to employees brining a mix of different communication devices into the workplace. Large and small corporates have been creating Bring Your Own Device policies (BYOD) into the workplace.
One take on the BYOD policy that has been reported by BT’s Managing Director Graham Sutherland reveals that BYOD uplifts employee confidence and staff morale, “Businesses are clearly embracing the BYOD phenomenon, and with great reason. Employees can pick and choose the devices they are most comfortable and productive with, and employers can reduce hardware costs. For a growing business, BYOD can make a real impact on savings and efficiency”. One can take the view that empowering this new breed of contemporary mobile worker and approach to work revolves around being proactive in the three key areas: policy, management, and application support.
However although BYOD can make employees feel at ease for the organization this can call for disaster recovery planning as the risk of cyber and potential terrorist attack is higher calling for such planning strategies to be put in place if such attack was to take place. So with BYOD being viewed as a potential risk to organizations this calls for a protected security solution to act as a barrier to protect the organizational activity and employees.
HP and F5 have partnered to speed cloud application deployment from months to minutes through a single policy focused around automation and management of application provisioning. The HP/F5 integration is also key to HP’s (BYOD) management offering with IMC, which was announced at Interop. Detailed application data gathered by the F5 management package can be shared with IMC to establish policies on application access by user, device, security profile, etc, for secure on-boarding of wired and wireless devices.
The Virtual Desktop Infrastructure from HP is a solution to BYOD Based on the HP ProLiant DL380p Gen8 server and Citrix VDI in a Box the HP Client Virtualization SMB Reference Architecture for Citrix VDI-in-a-Box (HP CV SMB RA for Citrix) is an appliance-like configuration that removes the guesswork from sizing and deploying a virtual desktop solution. The VDI in a Box features rapid development in less than two hours you can import the VDI in a Box software appliance to your HP ProLiant server. Predictable repeatable cost and performance whether you use a single stand-alone HP ProLiant DL380p Gen8 server or a grid of multiple servers. Built in high availability, High definition end user access to applications Assured log in performance and integrated solution level performance. Speak to our presales team for advice on HP products and tackling the BOYD revolution with solutions designed to suit your business.
The big debate at the top of the BYOD agenda is should the employee or the employer pick up the costs for buying personal hardware to be used at work. The organization should state any devices it won’t support for cost, logistical, security or integrity reasons, but the device itself should belong to the user. Some companies have relationships with carriers or suppliers that can result in special deals for employees, but in general, organizations should stay out of the purchasing phase of BYOD. This brings one potential threat to the commercial hardware sector which results in a lengthened hardware upgrade cycle. CISCO Internet Business Solutions Group study has revealed that 95% of businesses push devices in some way as there can be cost saving rewards for those BYOD policies that state it is of the employees duty to purchase the work device themselves, therefore creating a rise in consumer hardware expenditure. Employees who comply/decide to use BYOD within the workplace give employers a “big brother view” allowing wiping data, installing data and monitoring employee usage.
Ian Foddering CTO of CISCO has stated, “We found globally that 40% of college students and 45% of employees would accept a lower paying job with a choice of device”. One could argue that this could leave employers with the upper hand over with BYOD technology in the future. Hardware can supply a variety of solutions to protect from the threats of BYOD which can transform your business network. Juniper Networks provide different comprehensive ranges to suit the individual’s requirements for BYOD including Juno’s Pulse Gateways, SRX Series and Authentication Stack. Please contact our pre sales team to discuss your specific requirements further as we are here to get you the best solution for your organisation.
Hardware.com Pre- Sales Team: 0800 0830 646