& cplSiteName &

Rise to the BYOD Challenge

Denise Culver
Heavy Lifting Analyst Notes
Denise Culver
8/10/2012
50%
50%

A survey issued a few weeks ago showed that about 60 percent of enterprises have seen an increase in the amount of malware infections over the past 12 months. But the problems didn't originate from company desktop computers or email viruses. They originated from the use of insecure mobile devices being used in the workplace.

And that isn't an isolated study. Bring your own device (BYOD) is an issue that's resounding strongly across enterprises of all sizes in every country. While enterprises have largely learned to grapple with the security issues associated with desktop computers, corporate-owned devices and networks, they just don't have the resources or time to track down every employee who uses privately owned smartphones, tablets and other devices to access company information over the corporate network.

The reality is that enterprises shouldn't want to stifle the use of technology. It improves employee productivity and satisfaction. And, quite frankly, people often get a lot more done when left to their own devices than when given a set of tools that works for someone else.

But enterprises should have a healthy dose of fear. Mobile network operators (MNOs), mobile technology vendors and mobile security vendors should be working together on enabling BYOD. The companies featured in this month's Heavy Reading Mobile Networks Insider report, Enabling BYOD Creates Major Opportunity for Mobile Space, are facing a daunting challenge, but it's one with great promise. This is not a problem that's going away any time soon, and it's one that needs the collective attention of these industries so that enterprises can embrace mobile technology as much as consumers have.

This report examines the market for enabling BYOD, analyzing the most promising verticals for enabling BYOD and discussing drivers and challenges in the industry. It includes a comparative analysis of available solutions, examines the geographic landscape of the market and details trends that will likely occur in the industry over the next 18-24 months.

— Denise Culver, Research Analyst, Heavy Reading Mobile Networks Insider






The report, Enabling BYOD Creates Major Opportunity for Mobile Space, is available as part of an annual single-user subscription (six issues) to Mobile Networks Insider, priced at $1,595. Individual reports are available for $900. To subscribe, please visit: www.heavyreading.com/mobile-networks.

(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Tekelec
50%
50%
Tekelec,
User Rank: Light Beer
12/5/2012 | 5:24:04 PM
re: Rise to the BYOD Challenge



As so many devices are brought to the enterprise, they will be engaged constantly in “anytime, anywhere” communications with social networks, applications and services. This means the amount of communication and signaling that will traverse networks on which those enterprises rely will actually outpace the data traffic so many enterprisesfocus on. You are right in that all stakeholders should work collaboratively (MNOs, mobile tech vendors, enterprises, etc) so the quality of user experience is enhanced, not encumbered, by the networks empowering enterprise environments (as with cloud and M2M). http://blog.tekelec.com/

paolo.franzoi
50%
50%
paolo.franzoi,
User Rank: Light Beer
12/5/2012 | 5:23:26 PM
re: Rise to the BYOD Challenge


 


Just one point of clarification.   ALL mail sent from or received by the company's server is NOT private to the end user.  Employers basically can look at all that traffic anytime for any reason.  Those mails are private and confidential to the employer not the employee.


As to avoiding the BYOD thing.  That ship has sailed.


seven


 

Trilly Campanellino
50%
50%
Trilly Campanellino,
User Rank: Light Beer
12/5/2012 | 5:23:26 PM
re: Rise to the BYOD Challenge


There could be several reasons for this. One of them could be employees wanting to access restricted sites like Facebook or YouTube. There are two things here: (1) If the employee uses his own device (like an iPhone) and connects to the Internet using the company's network (2) Employee uses his own device and connects via the carrier's network (ATT/Verizon 4G). In both cases, security issues exists. In case (1), the employer's network admins could impose restrictions on the network usage. For example, "Block all traffic emanating from iPhone" (easy to fetch via HTTP User-Agent field) but the user might simply 'fool' the Firewall by using other apps (Ex: Download Lite for iPhone) where in you can set the app to 'identify itself' as Firefox. The firewall ACL will fail here (since the firewall will most probably not block traffic coming out of Firefox) and the employee now is using the company network to access sites which are not supposed to be visited. The problem is how much do you trust iPhone's security levels. Most employees sync up their personal devices to the company mailers (like MS Exchange server) and will have all/some of the company mails stored on their phones (or at least the headers). We will all agree that most of those mails are private and confidential. If the device is compromised, there is a very good chance that a malicious cracker could actually access those private mails even when the employee is connected to the company's network. In case (2) the same issues exist. Since the mails/headers are stored locally on the device, having a compromised device will put those P & C data at risk even if you are using your carrier's network. Now how can company's network admins verify the security 'strength' of employees' personal devices? Theoretically, it could be done but might result in a lot of costs. And if the employee brings his iPhone/iPad/iPod or any such devices, the costs only go up. Avg # devcies/employee might come up to 2. You cannot then, simply BLOCK ALL traffic from personal devices since many employees might not be happy.

More Blogs from Heavy Lifting Analyst Notes
With C-RAN, operators have more tools for shoehorning more customers into spectrum they already own.
To fully benefit from the opportunities of 5G, IoT and NFV, operators must assure their infrastructure, services and processes throughout each stage of their virtualization, automation and DevOps journey.
With the current industry consensus for deployment to commence broadly in 2020, now is the time to prepare transport networks for the coming of 5G.
The 2017 GCI ratings, which are used to compare digital transformation activity in different countries, hold some surprising results.
While service providers have traditionally relied on tracking two-way latency issues on their networks, switching to a superior one-way measurement approach would be far more effective.
From The Founder
The time has come for a telecom app store to save the industry.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Documentaries
Service Provider Panel: Partnering in the Digital Era

5|22|17   |     |   (0) comments


Coopetition has always been part of telecom, but the ecosphere now includes data centers, vendors, apps developers, cloud service providers and Internet content providers. This BCE 2017 panel explores the new attitudes among network operators as to the value and variety of ...
LRTV Interviews
Site Demo: AT&T's IoT Flow Platform

5|19|17   |   04:25   |   (0) comments


At AT&T's R&D center in Tel Aviv, Israel, project leader Eyal Segev talks about the operator's Flow platform and how it helps to prototype IoT applications.
LRTV Documentaries
Agent of Change: A Q&A With AT&T's John Donovan

5|18|17   |     |   (0) comments


Carol Wilson talks with the man leading AT&T's transformation efforts about the challenge of change.
LRTV Documentaries
BCE Service Provider Panel: The New Business Realities

5|18|17   |     |   (0) comments


For virtualization to happen, the telecom industry first has to grapple with key functional aspects of SDN and NFV that need to be universal, such as onboarding of virtualized network functions and federation of software-defined networks.
LRTV Interviews
BCE Service Provider Keynote: CenturyLink

5|16|17   |   22:32   |   (0) comments


Aamir Hussain leads the Product Development and Technology organization at CenturyLink, which includes the company's information technology function. He is an experienced senior technology executive with more than 25 years of proven success in the implementation of global technology operations, operationalization of complex technology, infrastructures and business ...
LRTV Interviews
CenturyLink CTO on Transformation

5|16|17   |   7:43   |   (0) comments


The 50-year-old telco has already gone through several transformations, including every time it made an acquisition, but its purchase of Level 3 coupled with changes in technology and customer expectations necessitates its biggest transformation yet.
LRTV Documentaries
Light Reading Hall of Fame 2017

5|15|17   |   5:05   |   (1) comment


Find out who made it into Light Reading's Hall of Fame this year.
LRTV Interviews
Site Visit: AT&T's Tel Aviv R&D Center

5|15|17   |   09:58   |   (1) comment


Nir Shalom, general manager and VP of application development at AT&T Israel, talks about the key service developments undertaken at the AT&T R&D facility in Tel Aviv and how the team there has adopted new ways of working.
Telecom Innovators Video Showcase
Act on Your Intelligence With Amdocs aia!

5|15|17   |     |   (0) comments


Amdocs CMO Gary Miles explains how communications service providers can seize the AI opportunity with Amdocs real-time digital intelligence platform.
LRTV Interviews
Logtel CEO: Making Sense of IoT

5|15|17   |   09:48   |   (0) comments


Jacques Bensimon, founder and CEO of Tel Aviv-based training and consultancy Logtel, talks about the need to make IoT more than just a buzzword.
LRTV Huawei Video Resource Center
The Challenges of Mobile Banking Implementation

5|12|17   |     |   (0) comments


Kamal Quadir of bKash Limited explains the challenges and needs of implementing mobile banking in the Bangladesh market.
LRTV Interviews
Tel Aviv: A Hub of Innovation

5|10|17   |   07:58   |   (0) comments


Light Reading's Ray Le Maistre and Dan Allen discuss the technology innovation, food and amazing sights they witnessed during a recent trip to Israel.
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
AT&T's Donovan: Women Adapt Faster Than Men
Sarah Thomas, Director, Women in Comms, 5/18/2017
Verizon on M&A: Who Needs a Cableco?
Mari Silbey, Senior Editor, Cable/Video, 5/17/2017
Standardization Needs Room for Innovation
Mitch Wagner, Editor, Enterprise Cloud, 5/17/2017
Fright Wigs & Cocktails: BCE 2017 in Pics
Mitch Wagner, Editor, Enterprise Cloud, 5/19/2017
When Gig Speeds Alone Aren't Enough
Mari Silbey, Senior Editor, Cable/Video, 5/23/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
TEOCO Founder and CEO Atul Jain talks to Light Reading Founder and CEO Steve Saunders about the challenges around cost control and service monetization in the mobile and IoT sectors.
Animals with Phones
What Brogrammers Look Like to the Rest of Us Click Here
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.