& cplSiteName &

Rise to the BYOD Challenge

Denise Culver
Heavy Lifting Analyst Notes
Denise Culver
8/10/2012
50%
50%

A survey issued a few weeks ago showed that about 60 percent of enterprises have seen an increase in the amount of malware infections over the past 12 months. But the problems didn't originate from company desktop computers or email viruses. They originated from the use of insecure mobile devices being used in the workplace.

And that isn't an isolated study. Bring your own device (BYOD) is an issue that's resounding strongly across enterprises of all sizes in every country. While enterprises have largely learned to grapple with the security issues associated with desktop computers, corporate-owned devices and networks, they just don't have the resources or time to track down every employee who uses privately owned smartphones, tablets and other devices to access company information over the corporate network.

The reality is that enterprises shouldn't want to stifle the use of technology. It improves employee productivity and satisfaction. And, quite frankly, people often get a lot more done when left to their own devices than when given a set of tools that works for someone else.

But enterprises should have a healthy dose of fear. Mobile network operators (MNOs), mobile technology vendors and mobile security vendors should be working together on enabling BYOD. The companies featured in this month's Heavy Reading Mobile Networks Insider report, Enabling BYOD Creates Major Opportunity for Mobile Space, are facing a daunting challenge, but it's one with great promise. This is not a problem that's going away any time soon, and it's one that needs the collective attention of these industries so that enterprises can embrace mobile technology as much as consumers have.

This report examines the market for enabling BYOD, analyzing the most promising verticals for enabling BYOD and discussing drivers and challenges in the industry. It includes a comparative analysis of available solutions, examines the geographic landscape of the market and details trends that will likely occur in the industry over the next 18-24 months.

— Denise Culver, Research Analyst, Heavy Reading Mobile Networks Insider






The report, Enabling BYOD Creates Major Opportunity for Mobile Space, is available as part of an annual single-user subscription (six issues) to Mobile Networks Insider, priced at $1,595. Individual reports are available for $900. To subscribe, please visit: www.heavyreading.com/mobile-networks.

(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Tekelec
50%
50%
Tekelec,
User Rank: Light Beer
12/5/2012 | 5:24:04 PM
re: Rise to the BYOD Challenge



As so many devices are brought to the enterprise, they will be engaged constantly in “anytime, anywhere” communications with social networks, applications and services. This means the amount of communication and signaling that will traverse networks on which those enterprises rely will actually outpace the data traffic so many enterprisesfocus on. You are right in that all stakeholders should work collaboratively (MNOs, mobile tech vendors, enterprises, etc) so the quality of user experience is enhanced, not encumbered, by the networks empowering enterprise environments (as with cloud and M2M). http://blog.tekelec.com/

paolo.franzoi
50%
50%
paolo.franzoi,
User Rank: Light Beer
12/5/2012 | 5:23:26 PM
re: Rise to the BYOD Challenge


 


Just one point of clarification.   ALL mail sent from or received by the company's server is NOT private to the end user.  Employers basically can look at all that traffic anytime for any reason.  Those mails are private and confidential to the employer not the employee.


As to avoiding the BYOD thing.  That ship has sailed.


seven


 

Trilly Campanellino
50%
50%
Trilly Campanellino,
User Rank: Light Beer
12/5/2012 | 5:23:26 PM
re: Rise to the BYOD Challenge


There could be several reasons for this. One of them could be employees wanting to access restricted sites like Facebook or YouTube. There are two things here: (1) If the employee uses his own device (like an iPhone) and connects to the Internet using the company's network (2) Employee uses his own device and connects via the carrier's network (ATT/Verizon 4G). In both cases, security issues exists. In case (1), the employer's network admins could impose restrictions on the network usage. For example, "Block all traffic emanating from iPhone" (easy to fetch via HTTP User-Agent field) but the user might simply 'fool' the Firewall by using other apps (Ex: Download Lite for iPhone) where in you can set the app to 'identify itself' as Firefox. The firewall ACL will fail here (since the firewall will most probably not block traffic coming out of Firefox) and the employee now is using the company network to access sites which are not supposed to be visited. The problem is how much do you trust iPhone's security levels. Most employees sync up their personal devices to the company mailers (like MS Exchange server) and will have all/some of the company mails stored on their phones (or at least the headers). We will all agree that most of those mails are private and confidential. If the device is compromised, there is a very good chance that a malicious cracker could actually access those private mails even when the employee is connected to the company's network. In case (2) the same issues exist. Since the mails/headers are stored locally on the device, having a compromised device will put those P & C data at risk even if you are using your carrier's network. Now how can company's network admins verify the security 'strength' of employees' personal devices? Theoretically, it could be done but might result in a lot of costs. And if the employee brings his iPhone/iPad/iPod or any such devices, the costs only go up. Avg # devcies/employee might come up to 2. You cannot then, simply BLOCK ALL traffic from personal devices since many employees might not be happy.

More Blogs from Heavy Lifting Analyst Notes
While there is little debate that fiber-based fronthaul is the future, there is concern that the CPRI protocol, as it stands, does not scale to the demands of 5G.
Around 1,000 delegates gathered in Munich this week to listen, discuss and clap at random at Deutsche Telekom's two-day cybersecurity event. But was there something missing?
Although the access market is quickly turning to wireless connections, fiber still has its place and is a growing commodity for vendors.
To offer high-level fiber quality assurance to the clients they are leasing to, network operators need to start looking into more comprehensive automated OTDR systems.
Heavy Reading's eight key takeaways from the TM Forum's annual jamboree in Nice.
From The Founder
Kicking off BCE 2017, Light Reading founder Steve Saunders lays blame for NFV's slow ramp-up and urges telecom to return to old-fashioned standards building and interoperability.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Interviews
CenturyLink: Let's Get Past SD-WAN Hype

6|23|17   |   04:02   |   (0) comments


Technology becomes a "shiny object" unless it's properly focused on solving business needs for enterprise customers, says Bill Grubbs, network solutions architect for CenturyLink. He explains to Light Reading why SD-WAN deployments have to be tailored to specific needs – and more.
Women in Comms Introduction Videos
Infinera's Sales Director Paints Tech's Big Picture

6|21|17   |   4:14   |   (1) comment


Shannon Williams, Infinera's director of sales, shares how she achieves work's many balancing acts -- between her role and the broader company, today and tomorrow's tech and more.
LRTV Custom TV
SD-WAN Innovation & Trends

6|20|17   |     |   (0) comments


Versa CEO Kelly Ahuja discusses with Carol Wilson the current status and trends in the SD-WAN market, Versa's innovation around building a software platform with broad contextualization, and the advantages that startups can bring to the SD-WAN market.
LRTV Interviews
Ovum's Dario Talmesio on 5G in Europe

6|20|17   |   02:16   |   (0) comments


At 5G World 2017, Dario Talmesio, principal analyst and practice leader on Ovum's fixed and mobile telecoms European team, explains the emerging trends amongst European operators as they prepare for 5G.
LRTV Custom TV
Putting Power on a Pedestal

6|19|17   |     |   (0) comments


ARRIS's John Ulm says a major accomplishment of SCTE•ISBE's Energy 2020 program is increased focus on power cost and consumption, including inclusion of energy requirements in operators' RFPs and RFIs.
LRTV Custom TV
Gigabit Access: The Last-Mile Pipe for All Future Services

6|19|17   |     |   (0) comments


A Gigabit access platform being deployed today must be able to deliver all types of services to an increasing number of devices. A non-blocking architecture is necessary to support the ever-increasing growth in bandwidth demand. The Huawei Gigabit access solution is based on a distributed design that is fully scalable to deliver a unprecedented performance.
LRTV Custom TV
Key Factors to Successfully Deploy an SD-WAN Service

6|19|17   |     |   (0) comments


As service providers transition their SD-WAN solution from trials and limited deployments into production at large scale, there are important considerations to successfully operationalize these solutions and realize their full potential, without adding complexity, introducing uncertainty or disrupting current business operations. Sunil Khandekar, CEO and Founder ...
LRTV Custom TV
IoT Solutions: Rational Exuberance

6|19|17   |     |   (0) comments


IoT solutions are morphing from hype into viable business opportunities. Huawei has the platform and ecosystem support to help carriers successfully address new business opportunities in the IoT space.
LRTV Custom TV
Realizing ICN as a Network Slice for Mobile Data Distribution

6|19|17   |     |   (1) comment


Network slicing in 5G allows the potential introduction of new network architectures such as Information-centric Networks (ICN) as a slice, managed over a shared pool of compute, storage and bandwidth resource. Services over an ICN slice can benefit from many architectural features such as Name Based Networking, Security, Multicasting, Multi-homing, Mobility, ...
LRTV Interviews
Ovum's Mike Roberts on 5G Uptake

6|19|17   |   04:08   |   (0) comments


Mike Roberts, research director for Ovum's service provider markets group, explains why he has boosted his 5G subscriptions forecast.
LRTV Interviews
AT&T's Hubbard on Intersection of SD-WAN & MPLS

6|15|17   |     |   (0) comments


Rick Hubbard, SVP of Network Product Management for AT&T Business Solutions, discusses how AT&T's approach to SD-WAN fits in with its overall virtualization strategy, explains how SD-WAN can improve enterprise customers' use of the cloud and addresses the intersection of SD-WAN and MPLS.
Telecom Innovators Video Showcase
Keep Connected IoT Devices Under Control With Allot

6|15|17   |     |   (0) comments


Allot AVP of International Pre-Sales, Daniel Keidar, explains how communications service providers can protect infrastructure and service availability from flooding attacks caused by malfunctioning or bot-infected devices connected to their network.
Upcoming Live Events
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Montcalm Marble Arch
November 1, 2017, The Montcalm Marble Arch
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Netflix's Lesson in Culture Expectation Settings
Sarah Thomas, Director, Women in Comms, 6/21/2017
No Imagination: UK Chip Biz Goes Up for Sale
Iain Morris, News Editor, 6/22/2017
Kalanick Steps Down as Uber CEO
Sarah Thomas, Director, Women in Comms, 6/21/2017
BT Tech Chief Makes Plea to 5G Chip Vendors
Ray Le Maistre, International Group Editor, 6/20/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Following a recent board meeting, the New IP Agency (NIA) has a new strategy to help accelerate the adoption of NFV capabilities, explains the Agency's Founder and Secretary, Steve Saunders.
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
Animals with Phones
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.