Light Reading

Rise to the BYOD Challenge

Heavy Lifting Analyst Notes
Heavy Lifting Analyst Notes
Heavy Lifting Analyst Notes
8/10/2012
50%
50%

A survey issued a few weeks ago showed that about 60 percent of enterprises have seen an increase in the amount of malware infections over the past 12 months. But the problems didn't originate from company desktop computers or email viruses. They originated from the use of insecure mobile devices being used in the workplace.

And that isn't an isolated study. Bring your own device (BYOD) is an issue that's resounding strongly across enterprises of all sizes in every country. While enterprises have largely learned to grapple with the security issues associated with desktop computers, corporate-owned devices and networks, they just don't have the resources or time to track down every employee who uses privately owned smartphones, tablets and other devices to access company information over the corporate network.

The reality is that enterprises shouldn't want to stifle the use of technology. It improves employee productivity and satisfaction. And, quite frankly, people often get a lot more done when left to their own devices than when given a set of tools that works for someone else.

But enterprises should have a healthy dose of fear. Mobile network operators (MNOs), mobile technology vendors and mobile security vendors should be working together on enabling BYOD. The companies featured in this month's Heavy Reading Mobile Networks Insider report, Enabling BYOD Creates Major Opportunity for Mobile Space, are facing a daunting challenge, but it's one with great promise. This is not a problem that's going away any time soon, and it's one that needs the collective attention of these industries so that enterprises can embrace mobile technology as much as consumers have.

This report examines the market for enabling BYOD, analyzing the most promising verticals for enabling BYOD and discussing drivers and challenges in the industry. It includes a comparative analysis of available solutions, examines the geographic landscape of the market and details trends that will likely occur in the industry over the next 18-24 months.

— Denise Culver, Research Analyst, Heavy Reading Mobile Networks Insider






The report, Enabling BYOD Creates Major Opportunity for Mobile Space, is available as part of an annual single-user subscription (six issues) to Mobile Networks Insider, priced at $1,595. Individual reports are available for $900. To subscribe, please visit: www.heavyreading.com/mobile-networks.

(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Tekelec
50%
50%
Tekelec,
User Rank: Light Beer
12/5/2012 | 5:24:04 PM
re: Rise to the BYOD Challenge



As so many devices are brought to the enterprise, they will be engaged constantly in “anytime, anywhere” communications with social networks, applications and services. This means the amount of communication and signaling that will traverse networks on which those enterprises rely will actually outpace the data traffic so many enterprisesfocus on. You are right in that all stakeholders should work collaboratively (MNOs, mobile tech vendors, enterprises, etc) so the quality of user experience is enhanced, not encumbered, by the networks empowering enterprise environments (as with cloud and M2M). http://blog.tekelec.com/

paolo.franzoi
50%
50%
paolo.franzoi,
User Rank: Light Beer
12/5/2012 | 5:23:26 PM
re: Rise to the BYOD Challenge


 


Just one point of clarification.   ALL mail sent from or received by the company's server is NOT private to the end user.  Employers basically can look at all that traffic anytime for any reason.  Those mails are private and confidential to the employer not the employee.


As to avoiding the BYOD thing.  That ship has sailed.


seven


 

Trilly Campanellino
50%
50%
Trilly Campanellino,
User Rank: Light Beer
12/5/2012 | 5:23:26 PM
re: Rise to the BYOD Challenge


There could be several reasons for this. One of them could be employees wanting to access restricted sites like Facebook or YouTube. There are two things here: (1) If the employee uses his own device (like an iPhone) and connects to the Internet using the company's network (2) Employee uses his own device and connects via the carrier's network (ATT/Verizon 4G). In both cases, security issues exists. In case (1), the employer's network admins could impose restrictions on the network usage. For example, "Block all traffic emanating from iPhone" (easy to fetch via HTTP User-Agent field) but the user might simply 'fool' the Firewall by using other apps (Ex: Download Lite for iPhone) where in you can set the app to 'identify itself' as Firefox. The firewall ACL will fail here (since the firewall will most probably not block traffic coming out of Firefox) and the employee now is using the company network to access sites which are not supposed to be visited. The problem is how much do you trust iPhone's security levels. Most employees sync up their personal devices to the company mailers (like MS Exchange server) and will have all/some of the company mails stored on their phones (or at least the headers). We will all agree that most of those mails are private and confidential. If the device is compromised, there is a very good chance that a malicious cracker could actually access those private mails even when the employee is connected to the company's network. In case (2) the same issues exist. Since the mails/headers are stored locally on the device, having a compromised device will put those P & C data at risk even if you are using your carrier's network. Now how can company's network admins verify the security 'strength' of employees' personal devices? Theoretically, it could be done but might result in a lot of costs. And if the employee brings his iPhone/iPad/iPod or any such devices, the costs only go up. Avg # devcies/employee might come up to 2. You cannot then, simply BLOCK ALL traffic from personal devices since many employees might not be happy.

More Blogs from Heavy Lifting Analyst Notes
To thrive in the Internet age, operators must transform themselves from 'communications service providers' into 'digital service providers.'
Survey says telcos see increased network flexibility and service agility as the primary benefits of the New IP.
In part 3 in a series of blogs on 'Accelerating NFV Implementation,' Caroline Chappell considers how the NFV Management and Orchestration (MANO) stack needs to work with OSS functions to operationalize NFV.
Mobile operators feel an urgency to virtualize the EPC, and are exploring a variety of ways to move forward, on an ambitious timeframe.
Despite all the work that has already been put into defining and developing use cases, many service providers think more attention needs to be paid to the economics of SDN and NFV.
Flash Poll
From The Founder
Network architects aiming to upgrade their networks to support agile, open, virtualized services in the 21st century need to consider new criteria when choosing between technology suppliers.
Live Streaming Video
BTE 2015 Sponsor Keynote: HP
Dr. Prodip Sen, CTO, Network Functions Virtualization, HP
LRTV Custom TV
Red Hat Demo

7|2|15   |   10:53   |   (0) comments


Red Hat's Nicolas Lemieux demonstrates how Red Hat is driving innovation through open source communities.
LRTV Custom TV
Red Hat's Approach to OpenStack Adoption

7|2|15   |   5:17   |   (0) comments


Red Hat's Radhesh Balakrishnan outlines his company's open source strategy for both enterprises and telcos.
LRTV Custom TV
The New IP Goes Mobile With vEPC

7|2|15   |   1:12   |   (0) comments


Heavy Reading's Gabriel Brown discusses results of a Light Reading survey sponsored by Brocade that shows a clear commitment by mobile operators to move quickly to virtual EPC deployment.
LRTV Custom TV
Making Business Sense of SDN

7|2|15   |   1:42   |   (0) comments


Results of a Brocade-sponsored survey show that CSPs have a clear sense of SDN use cases but are wrestling with the business case. Sterling Perrin of Heavy Reading looks behind the numbers.
LRTV Custom TV
NFV Will Be Here Sooner Than You Think

7|2|15   |   2:22   |   (0) comments


Forget the usual ten-year cycle for new technologies – NFV will be a core part of CSP networks in five years, based on results of a Brocade-sponsored survey, says Heavy Reading's Caroline Chappell.
LRTV Custom TV
The New IP Gains Traction With CSPs

7|2|15   |   1:42   |   (0) comments


Roz Roseboro of Heavy Reading analyzes results of a Light Reading survey sponsored by Brocade showing that CSPs are getting serious about making the transition to the New IP era.
LRTV Custom TV
It's (Real) Time for Analytics

7|2|15   |   1:42   |   (0) comments


Heavy Reading's Jim Hodges looks at how CSPs say they plan to use analytics to deploy new services in real time as part of The New IP, based on results of a survey sponsored by Brocade.
LRTV Documentaries
IoT in Action

6|30|15   |   1:39   |   (7) comments


Two co-workers discuss the benefits of IoT technology.
LRTV Interviews
Ericsson Opens Up on OPNFV

6|30|15   |   14:16   |   (1) comment


Martin Bäckström, VP and head of industry area Datacom at Ericsson, talks to Light Reading founder and CEO Steve Saunders about the emergence of OPNFV, the importance of standards and Ericsson's OPNFV plans.
LRTV Custom TV
NetNumber Founder Discusses NFV/SDN Impact on SP Networks

6|26|15   |   4:15   |   (0) comments


NetNumber Founder Doug Ranalli examines why SPs need a new network infrastructure for service agility. While NFV and SDN are the tools, the old ways of thinking about signaling control are inhibitors. Doug provides his recommendations.
LRTV Custom TV
Orchestrating NFV vCPE Services Across Multivendor Networks

6|26|15   |   5:46   |   (0) comments


Nirav Modi provides an overview of vCPE, the fastest-growing NFV use case, showing how Cyan's Blue Planet orchestrates vCPE services across a multivendor infrastructure to rapidly deliver new managed services for business customers.
LRTV Custom TV
ZTE at LTE Summit Amsterdam 2015

6|26|15   |     |   (0) comments


As one of the leading global telecommunications providers, ZTE presented its cutting-edge technology at LTE World Summit 2015 in Amsterdam. On display at ZTE's booth were the latest R&D achievements in wireless, 5G development, HetNet, deep convergence of FDD and TDD, and RCS/IMD/iSDN/vCN.
Upcoming Live Events
September 16-17, 2015, The Westin Galleria Dallas, Dallas, TX
September 29-30, 2015, The Westin Grand Müchen, Munich, Germany
October 6, 2015, The Westin Peachtree Plaza, Atlanta, GA
October 6, 2015, Westin Peachtree Plaza, Atlanta, GA
October 14-15, 2015, New Orleans Ernest N. Morial Convention Center, New Orleans, LA
November 5, 2015, Hilton Santa Clara, Santa Clara, CA
All Upcoming Live Events
Infographics
Hot Topics
Who's Feeding Fiber to LinkNYC Hotspots?
Mari Silbey, Senior Editor, Cable/Video, 6/29/2015
Colt to Jettison Ailing IT Business
Iain Morris, News Editor, 6/30/2015
Eurobites: Activist Investor Takes Stake in AlcaLu
Paul Rainford, Assistant Editor, Europe, 6/30/2015
What's a Gigabit Good For?
Carol Wilson, Editor-at-large, 7/1/2015
Like Us on Facebook
Twitter Feed
Webinar Archive
BETWEEN THE CEOs - Executive Interviews
Casa Systems has been going from strength to strength over the last couple of years. In 2013, it became the first vendor to ship an integrated CCAP device -- the ...
Cedrik Neike, SVP of Global Service Provider, Service Delivery, at Cisco, talks to Light Reading founder and CEO Steve Saunders about solving service provider customer problems in a virtualized, DevOps world, including multivendor support and the future of network procurement.
Cats with Phones