Get Instant Access
to This Blueprint

Infrastructure Operations icon

Secure the Network in a BYOD World

Your tolerance for risk will define your strategy.

  • BYOD is becoming a reality in most organizations as more employees and senior management want to be able to merge their personal devices with their professional lives.
  • Allowing personal devices opens up a world of new security risks that need to be addressed before BYOD is implemented.
  • Organizations need to understand their tolerance to these risks before they can determine the right strategy to tackle them.

Our Advice

Critical Insight

  • Securing your network in the face of BYOD is not a one size fits all scenario.
  • Every organization requires a unique strategy based on its tolerance to risk.
  • An organization with a high tolerance to risk will require fewer controls than a low risk tolerant organization such as a hospital.
  • Risk tolerance is dependent on a number of factors – the amount of sensitive data an organization maintains is a main one. The more sensitive data an organization possesses, the less risk it will be comfortable taking on.
  • Having an understanding of your risk tolerance is the first and most important step before determining what kind of network security strategy is best.

Impact and Result

  • Maximize your security strategy success by seeking first to understand your tolerance to risk, then choosing a strategy based on that risk tolerance level.
  • Prepare to adjust your strategy if you discover your perception of your risk tolerance level differs from reality. You may need to invest in more security-related tactics, or decide to scale back your methods.

Secure the Network in a BYOD World Research & Tools

1. Understand how the organization's risk tolerance affects what network security strategy must be implemented.

Understand the definitions of risk tolerance, and how each level informs a network security strategy.

2. Identify whether the current perception of the organization's risk tolerance matches reality, and identify gaps in the security strategy.

Understand the requirements the organization must adhere to, the controls it has in place, and the controls that are on the implementation roadmap.

Secure the Network in a BYOD World preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Authors

Jessica Ireland

Sean Thurston

TJ Minichillo

James McCloskey

Wesley McPherson

Contributors

  • Westpoint Home Inc.
  • Harford Community College
  • Apogee Enterprises Inc.
  • Jackson County
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019