In a BYOD environment, it is likely that individuals may have multiple devices connected to the network, possibly simultaneously. This leads to a large increase in overall connected devices. The network must be designed in a way to support these additional devices and their traffic.
Additionally, a complete BYOD solution must consider how to extend the full services of the organization seamlessly, providing the same type of services to a user on a BYOD, as a user on a corporate PC. This includes collaboration tools such as integrated voice, video, IM, conferencing, and application sharing.
Finally, the network and applications must be able to offer quality of service regardless of whether the connectivity to those applications or collaboration tools occurs in the main campus, branch office, home office, or mobile teleworker location. Any solution must consider not only the employee using their own device, but also the individuals and applications that they are connecting and communicating with.
Security is a major consideration in a BYOD environment, therefore, any solution must be a highly secure mobile solution. Mobile and remote access devices are typically not under the same strict control and scrutiny as employer provided desktop and laptop computers. Subsequently, there is a need to apply appropriate security and user policies to protect corporate data when employees connect with these devices. The range of those policies may vary depending on the spectrum of BYOD access that an organization wants.
The figure shows a range of BYOD policies that may be in place from limited access to advanced BYOD implementation. Each of these implementations must include end user agreements that outline the use of personal devices on corporate networks, as well as policies for how and what those devices can access, as well as how lost or stolen devices will be handled. Organizations may also need an agreement about when and if data can be accessed from the personal device of an employee. There have been several legal challenges recently for cases involving an employer who remotely “wiped” an employee-owned device, including both the corporate and personal data it contained. Imagine your surprise as an employee when by using your new tablet to access the corporate network, you unknowingly agreed to let IT delete your favorite family photos remotely.