Secure the Network in a BYOD World
Your tolerance for risk will define your strategy.
Send a friend or colleague a link to this article
- BYOD is becoming a reality in most organizations as more employees and senior management want to be able to merge their personal devices with their professional lives.
- Allowing personal devices opens up a world of new security risks that need to be addressed before BYOD is implemented.
- Organizations need to understand their tolerance to these risks before they can determine the right strategy to tackle them.
- Securing your network in the face of BYOD is not a one size fits all scenario.
- Every organization requires a unique strategy based on its tolerance to risk.
- An organization with a high tolerance to risk will require fewer controls than a low risk tolerant organization such as a hospital.
- Risk tolerance is dependent on a number of factors – the amount of sensitive data an organization maintains is a main one. The more sensitive data an organization possesses, the less risk it will be comfortable taking on.
- Having an understanding of your risk tolerance is the first and most important step before determining what kind of network security strategy is best.
Impact and Result
- Maximize your security strategy success by seeking first to understand your tolerance to risk, then choosing a strategy based on that risk tolerance level.
- Prepare to adjust your strategy if you discover your perception of your risk tolerance level differs from reality. You may need to invest in more security-related tactics, or decide to scale back your methods.
- Westpoint Home Inc.
- Harford Community College
- Apogee Enterprises Inc.
- Jackson County
Get the Complete Storyboard
See how all the steps you need to take come together, with tools and advice to help with each task on your list.Download Now
Get to Action
Understand how the organization's risk tolerance affects what network security strategy must be implemented.
Understand the definitions of risk tolerance, and how each level informs a network security strategy.
Identify whether the current perception of the organization's risk tolerance matches reality, and identify gaps in the security strategy.
Understand the requirements the organization must adhere to, the controls it has in place, and the controls that are on the implementation roadmap.
Master the Ever-Expanding Puzzle of End-User Computing With a Strategy and Roadmap
Exploit Disruptive Infrastructure Technology
Seize the Potential of the Internet of Things Today
Stop Managing Endpoints
Choose and Implement a Mobile Strategy
Develop & Enforce Policies that Securely Enable a Mobile Workforce
Select and Implement Enterprise Mobility Management
Implement a Mobility Strategy with Enterprise Mobility Management
Switch Mobile Platforms
Implement Desktop Virtualization and Transition to Everything as a Service
Migrate to Windows 10
Create a Practical BYOE Action Plan
Create a Consumer Technology Integration Plan in Five Steps
Kick-Start IT-Led Business Innovation
Reduce Costs Through Printer Consolidation
Migrate to Office 365 Now
Create a Strategy and Roadmap for Office 365
Plan and Implement Office 365
Consider BYOC as Part of a Desktop-as-a-Service Strategy
Transition to BYOD and Beyond
Secure the Network in a BYOD World
Create a Corporate Personal Cloud Vision in Two Days
Forge a New Standard for End-User Devices
Vendor Landscape: Collaboration Platforms