Handbook-Solving Challenges of BYOD_hb_final

Embed Size (px)

Citation preview

  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    1/15

    Handbook

    1EDITORS NOTE

    2APPLYING IT

    GOVERNANCE TO BYOD

    3FOUR BYOD HURDLESTO CONSIDER

    4BYOD STRAINS CORPORATE

    WIRELESS BANDWIDTH

    VIRTUALIZ

    ATION

    CLOUD

    APPLICATI

    ONDEVELOPMENT

    NETWORKING

    STORAGEARCHITECTURE

    DATACENT

    ERMANAGEMENT

    BIAPPLICA

    TIONS

    DISASTER

    RECOVERY/COMPLIANCE

    SECURITY

    Solving the Challengesof BYODBring your own device policies bring hidden challenges, including

    additional costs and dangers to data. IT must consider factors

    including user device choices, network bandwidth and security,as well as tools for monitoring diverse mobile devices.

  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    2/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    2 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    1EDITORSNOTE

    Minding Your Business with BYOD

    Whats wrong with allowing users to access corporate systems with their

    own devices? Businesses can save money on hardware, workers can be effective

    anywhere, and managing mobile devices is a breeze. Well, all but that last part.

    Enterprises should have consistent bring your own device (BYOD) policies, or IT

    could be overwhelmed by the proliferation of laptops, smartphones and tablets.Luckily, existing tools can help. Expert Lisa Phifer discusses how to apply IT

    governance to wireless environments. Admins need to weave BYOD into IT strat-

    egy, which requires some forethought and the right combination of software and

    best practices. Mobile device management tools have emerged to help.

    As you consider policies, Craig Mathias takes a look at potential hurdles for

    BYOD success. James Furbush takes a closer look at how BYOD affects corporate

    wireless networks, which might not be ready for the bandwidth demands placed

    on them. Its up to IT to make sure that availability and security are maintained. n

    Eugene Demaitre

    Associate Managing Editor

    Data Center and Virtualization Media Group

  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    3/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    3 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    Applying IT Governance to BYOD

    Many companies hope that bring your own device programs will reduce costs

    by shifting mobile device purchases and monthly service fees from employer to

    employee. Unfortunately, these savings are offset by new expenses. Wi-Fi-enabled

    consumer electronics have triggered an explosion in the number of devices con-

    necting to corporate networks and requiring some degree of governance. A recentCisco IBSG Horizons survey found that the average number of devices per knowl-

    edge worker will jump from 2.2 in 2012 to 3.3 by 2014, increasing IT spending on

    mobility initiatives to 20% by 2014.

    Laptops, smartphones and tablets have a direct effect on the total cost of

    ownership of corporate networks. Wireless LAN infrastructure must be added to

    satisfy growing bandwidth demands. Security systems must spot and block non-

    business trafc, such as streaming video and back channels for Trojan horses.

    Bring your own device (BYOD) policies should include quality-of-service

    mechanisms to ensure performance. IT must create diagnostic tools and mobile

    management processes to deal with diverse and often cranky consumer devices.

    Furthermore, every new employee-owned device represents an opportunity to

    leak corporate data. BYOD challenges include lost or stolen devices with data that

    2GOVERNANCE

    http://www.cisco.com/web/about/ac79/docs/BYOD.pdfhttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-and-BYOD-cost-challenges-plague-organizationshttp://www.cisco.com/web/about/ac79/docs/BYOD.pdf
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    4/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    4 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    2GOVERNANCEcannot be remotely wiped, malware infections, and sensitive data thats too easily

    forwarded outside the workplace.

    To avoid these pitfalls, businesses must implement BYOD safeguards and

    monitor mobile device usage to detectand preferably preventsuch leaks.

    HOW IT GOVERNANCE CAN HELP

    These BYOD challenges are not insurmountable, but they require careful consid-

    eration, backed by a plan for action. The intersection between corporate networksand the wireless world should not be a wild west where anything goes and IT

    cant stop it. Instead, administrators can stem potential BYOD bleeding with de-

    vice discovery, impact assessment and minimum criteria for acceptable use.

    Many contemporary WLAN and network access control (NAC) products have

    device discovery and ngerprinting features that IT can use to identify mobile

    devices. Those that fall into known categories can be automatically redirected to

    mobile device management (MDM) enrollment portals. Previously unseen devices

    can be blocked, awaiting further BYOD consideration.

    To decide which devices to block vs. enroll, assess those already used in your

    workplace. Consult with business units to determine application and data require-

    ments, and identify associated risks and security capabilities.

    This assessment should result in documented BYOD criteria that any device

  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    5/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    5 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    2GOVERNANCEmust pass to be authorized. Typically, minimum criteria include support for re-

    mote wipe, passcode-based device access control and hardware encryption.

    These security capabilities reduce risks from lost or stolen devices. Some busi-

    ness units that handle more sensitive data may impose more stringent require-

    ments, such as support for two-factor-based access control, FIPS 140-certied

    encryption or forensic data scrubbing.

    In addition to establishing criteria, create and maintain lists of mobile devices

    that IT agrees to fully support and those that you have deemed so disruptive or

    dangerous they cannot be tolerated. Most employee devices will fall in betweenthese two extremes, letting you grant access while minimizing associated support

    and troubleshooting costs.

    MOVING FROM ACCEPTANCE TO ENABLEMENT

    Ultimately, BYOD governance should go beyond triage to enable business pro-

    ductivity. Enterprise mobility management software can help you enable safe use.

    For example, MDM enrollment portals check redirected devices against minimum

    criteria; those that pass muster can immediately proceed on to MDM security

    policy management without requiring any IT assistance.

    These tools can speed and simplify enablement by applying BYOD security

    policies, such as requiring passcodes and timeouts and creating secure network

    http://searchconsumerization.techtarget.com/tip/BYOD-pros-and-cons-Spend-less-on-devices-more-on-supporthttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-management-Choosing-the-right-approachhttp://searchconsumerization.techtarget.com/feature/Enterprise-mobility-management-Choosing-the-right-approachhttp://searchconsumerization.techtarget.com/tip/BYOD-pros-and-cons-Spend-less-on-devices-more-on-support
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    6/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    6 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    2GOVERNANCEor email connections. Once congured, MDM software can also repeatedly check

    to make sure settings have not changed.

    Next, these tools can give devices extra attention where needed. For example,

    use MDM software to deploy enterprise applications and remote diagnostic tools

    to fully supported devices. These steps can let IT admins quickly and easily turn

    an employee-owned device into a fully functional business platform.

    In addition, deploy secure data lockers or secure email clients when you want

    to keep corporate data safe on less-trustworthy devices. This is yet another way to

    enable devices that might otherwise be considered unsafe. These MDM-deployedtools can help IT ll safety gaps and therefore permit more devices.

    These automated, over-the-air management techniques can help promote safe

    business use while avoiding the need for IT to manually provision and maintain

    mobile devices.

    KEEPING A WATCHFUL EYE

    Finally, use network tools to monitor trafc, and make sure that all authorized

    devices are playing by BYOD rules.

    Next-generation rewalls and a growing number of WLAN products are

    application-awarethat is, they can grant selected users and devices broader ac-

    cess to specic applications and commands. This is a great way to inch open the

  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    7/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    7 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    2GOVERNANCEoodgates for BYOD while retaining IT controls to rein in bandwidth hogs and

    acceptable-use violations.

    For the best results, combine network trafc rules with intrusion prevention

    and link-layer prioritization to ensure that mission-critical trafc gets preferential

    treatment and will not be slowed by BYOD-generated personal trafc.

    Of course, even with the best plans put into action, problems will arise. De-

    velop new procedures for BYOD security incident response and troubleshooting.

    Focus on quickly containing the potential damage from a cranky, hacked, lost or

    stolen device.For example, establish a process for BYOD users to report missing devices. IT

    should also have plans for locating such a device, quarantining it, wiping business

    data and (where necessary) permanently disabling future corporate access.

    Mobile devices will continue to require IT effort and toss a few curve balls.

    However, taking a methodical approach to BYOD governance can make a world of

    difference in IT overhead and worker productivity. Lisa Phifer

    http://searchconsumerization.techtarget.com/tip/How-to-plan-for-BYOD-securityhttp://searchconsumerization.techtarget.com/guide/Bring-your-own-device-policy-Everything-you-need-to-knowhttp://searchconsumerization.techtarget.com/guide/Bring-your-own-device-policy-Everything-you-need-to-knowhttp://searchconsumerization.techtarget.com/tip/How-to-plan-for-BYOD-security
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    8/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    8 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    Four BYOD Hurdles to Consider

    Before jumping into the bring your own device race, think about the potential

    hurdles, including cost, policies, user support and security.

    If youve read my column on the advantages of a bring your own device (BYOD)

    program, you may have guessed that I am a huge fan of the BYOD movement. I

    think it will easily dominate the client/access end of enterprise IT over the nextfew years. But there are some BYOD challenges, many of which are cultural and

    operational, as opposed to purely technological. End-user education and careful

    analysis of BYODs effects on how organizations work are just as important as the

    tools that IT ultimately applies to handle BYOD.

    COST AND POLICY CHALLENGES

    First, consider how to pay for services. Users may cover the cost of their own

    devicesalthough the employer might provide a subsidybut who pays for

    a devices voice and data plans? There are a number of possibilities for BYOD

    cost-sharing.

    Employers can reimburse a xed amount or a certain percentage of a wireless

    3BYOD HURDLES

    http://searchconsumerization.techtarget.com/tip/Four-BYOD-challenges-to-consider-before-diving-inhttp://searchconsumerization.techtarget.com/tip/BYOD-advantages-Save-money-mobilize-workers-embrace-the-cloudhttp://searchenterprisedesktop.techtarget.com/news/2240148535/BYOD-and-mobile-cloud-apps-lead-to-licensing-compliance-issueshttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchconsumerization.techtarget.com/tip/BYOD-cost-sharing-Who-pays-for-whathttp://searchenterprisedesktop.techtarget.com/news/2240148535/BYOD-and-mobile-cloud-apps-lead-to-licensing-compliance-issueshttp://searchconsumerization.techtarget.com/tip/BYOD-advantages-Save-money-mobilize-workers-embrace-the-cloudhttp://searchconsumerization.techtarget.com/tip/Four-BYOD-challenges-to-consider-before-diving-in
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    9/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    9 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    3BYOD HURDLESbill, or companies can pay only for business-related phone calls. Accounting for

    data usage is far more complex, because it can be difcult to determine whether

    the access was business or personal.

    In most cases, I recommend a predened xed-percentage reimbursement for

    data. Its easy, simple to calculate and minimizes the opportunity for disputes.

    Companies can also look into corporate plans to cut

    the base cost overall.

    Next, youll need policies, agreements, education,

    training and consciousness-raising. At the very least,youll need acceptable-use and security policies. A

    BYOD agreement should reect users understanding

    of all policies, procedures and tools involved.

    A training class, online educational tools and

    regular reminders of the importance of adhering to policies are essential, as is

    appropriate disciplinary action when employees violate policy. Make it clear that

    careless regard for corporate data is not acceptable, nor is exposing the organiza-

    tion to potential legal or regulatory risks.

    Then theres the challenge of user support and its associated costs. It begins

    with onboarding users and their devices, a process that needs to be as simple

    and self-service as possible. Help desk staffers need to be up to speed on common

    problems and how to x them with minimal effort.

    At the very least,youll need accept-

    able-use andsecurity policies.

    http://searchconsumerization.techtarget.com/tip/BYOD-security-policy-considerations-and-best-practiceshttp://searchconsumerization.techtarget.com/tip/BYOD-security-policy-considerations-and-best-practices
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    10/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    10 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    3BYOD HURDLESI recommend limiting users choice of devices to a few on an approved list. Re-

    ducing the opportunity for device proliferation can limit the overhead that comes

    with supporting any given device or version of an operating system. Bring your

    own device isnt the same as bring any device.

    MANAGEMENT AND SECURITY CHALLENGES

    While mobile device management is the best way to handle enterprise-owned de-

    vices, personal devices present a challenge. Policies should clearly spell out whatthe organization can and cannot do with respect to device conguration, enforce-

    ment and usage tracking, as well as how enterprise-owned data will be managed.

    A major BYOD challenge is security. Any IT manager who isnt concerned

    about sensitive organizational information walking around on user-owned devices

    isnt paying attention. There are steps IT can take to improve security, even though

    the security challenge crosses technical, operational and even cultural lines.

    It would be wrong to jump into BYOD without careful consideration of po-

    tential challenges. But as BYOD gains popularity, the technologies, systems and

    procedures required to make it work are evolving just as rapidly. The hurdles may

    seem insurmountable initially, but most IT shops will eventually nd that the race

    to BYOD is indeed worth running. Craig Mathias

    http://searchconsumerization.techtarget.com/tip/Mobile-device-management-checklisthttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchdatabackup.techtarget.com/news/2240178774/Cloud-backup-BYOD-challenges-can-threaten-IT-control-over-datahttp://searchconsumerization.techtarget.com/tip/BYOD-FAQ-Answers-to-ITs-burning-questions-about-BYODhttp://searchconsumerization.techtarget.com/tip/BYOD-FAQ-Answers-to-ITs-burning-questions-about-BYODhttp://searchdatabackup.techtarget.com/news/2240178774/Cloud-backup-BYOD-challenges-can-threaten-IT-control-over-datahttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchconsumerization.techtarget.com/resources/Mobile-policy-and-enforcement-for-consumerizationhttp://searchconsumerization.techtarget.com/tip/Mobile-device-management-checklist
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    11/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    1 1 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    BYOD Strains Corporate Wireless Bandwidth

    It used to be that enterprises could plan for a ratio of one device per user. But

    with bring your own device programs, each employee uses multiple devices, put-

    ting signicant strain on traditional wireless network infrastructures.

    In the bring your own device (BYOD) era, a corporate wireless network that

    scales up to 50 devices is no longer enough, said RobShaughnessy, chief technology ofcer at Circadence,

    a WAN optimization company in Boulder, Colo.

    Its triage. The scaling that were seeing is thou-

    sands of endpoints, Shaughnessy said. We have a

    customer in Asia with 500,000 endpoints. Can you

    imagine the challenges that presents?

    IT professionals run into problems with band-

    width performance in part because a single Wi-Fi

    connection can really support only 15-20 devices

    any more than that, and the connection signal strength begins to deteriorate sig-

    nicantly, said Perry Correll, senior technologist at Xirrus, a Wi-Fi technology

    company in California.

    Its triage. Thescaling that wereseeing is thousandsof endpoints.ROB SHAUGHNESSY,

    chief technology ofcer,

    Circadence

    4WIRELESSBANDWIDTH

    http://searchconsumerization.techtarget.com/tip/How-to-control-enterprise-tablet-bandwidth-consumptionhttp://searchconsumerization.techtarget.com/tip/How-to-control-enterprise-tablet-bandwidth-consumption
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    12/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    12 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    4WIRELESSBANDWIDTHIf 30 people are sharing a single [connection], then each device is only getting

    a 1 Mbps connection, and that is terrible, he said.

    IS CORPORATE WIRELESS INFRASTRUCTURE READY FOR BYOD?

    Building a modular corporate wireless network with the ability to add more con-

    nections is one of the simplest things enterprises can do to future-proof their

    networks, Correll said.

    Even companies that dont yet support a BYODprogram should recognize that tablets and smart-

    phones have been making their way onto corporate

    networks, and IT better plan for more devices to

    come.

    In fact, by 2015, 80% of recently installed cor-

    porate wireless networks will become obsolete

    because of poor infrastructure planning, according

    to a new study by Gartner Inc. The same report

    suggests that, as a response to widespread mobile

    device adoption, enterprises will need to deliver 300% more wireless access

    points to provide Internet performance that is similar to the performance of the

    pre-BYOD era.

    By 2015, 80% ofrecently installedcorporate wirelessnetworks will becomeobsolete because ofpoor infrastructure

    planning.

    http://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-workhttp://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-workhttp://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-workhttp://searchconsumerization.techtarget.com/tip/How-to-make-a-BYOD-program-work
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    13/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    13 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    4WIRELESSBANDWIDTHOther Wi-Fi-enabled devices such as projectors, scanners and printers could

    cause similar network problems if businesses dont plan accordingly.

    INCREASING WIRELESS NETWORK BANDWIDTH FOR BYOD

    Even Emulex, a company that solves networking problems, experienced its own

    share of bandwidth difculties, forcing the company to prioritize a long overdue

    Wi-Fi infrastructure update.

    The Emulex headquarters consists of three buildings in Costa Mesa, Calif., witha tech-savvy workforce. Employees continually used Skype between international

    corporate locations and use Wi-Fi on their personal devices while walking between

    buildings on campus. All of that amounts to a lot of bandwidth use.

    BYOD has put a strain on our network, said David Goff, Emulexs chief tech-

    nology ofcer. Its requiring us to be more proactive.

    Emulex increased wireless network bandwidth, access points and available

    coverage. The company also devised a strategy for offering two separate Wi-Fi

    networks: the corporate wireless network and a guest network.

    The guest network is password-protected and keeps sensitive corporate data

    behind the rewall. Mainly for employees personal use on their own devices, only

    users with mobile devices that meet Emulexs security protocols can access the

    corporate wireless network with that device.

  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    14/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    14 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    4WIRELESSBANDWIDTHThe company also upgraded its Wi-Fi to the 802.11n wireless LAN standard,

    laying a stable foundation for the years to come.

    SECURING CORPORATE WIRELESS NETWORKS

    IT departments shouldnt simply throw more bandwidth at their BYOD problems.

    They also need to consider the network stability and security ramications of

    employees Wi-Fi use and plan accordingly, said Frank Andrus, CTO of Bradford

    Networks, a network access control company.Do I really want someones iPhone on the network? he said. Its causing ca-

    pacity problems if its on the network. Businesses need to evaluate what devices

    are really needed to perform the day-to-day functions.

    A good way to do it is with network access controlsa security method that

    limits which devices can access the corporate network based on either a business-

    dened or a role-based policy.

    Ideally, what you want is full visibility to what kind of assets have access and

    what the user has been doing, said Rainier Enders, CTO of NCP Engineering Inc.,

    a virtual private network provider in Mountain View, Calif. James Furbush

    http://searchsecurity.techtarget.com/news/2240178706/Vendors-showcase-MAM-products-that-ease-BYOD-challenges-at-RSA-2013http://searchconsumerization.techtarget.com/tip/Network-access-control-policy-Handling-smartphone-access-controlhttp://searchconsumerization.techtarget.com/tip/Network-access-control-policy-Handling-smartphone-access-controlhttp://searchsecurity.techtarget.com/news/2240178706/Vendors-showcase-MAM-products-that-ease-BYOD-challenges-at-RSA-2013
  • 7/28/2019 Handbook-Solving Challenges of BYOD_hb_final

    15/15

    Home

    Editors Note

    Applying IT

    Governance

    to BYOD

    Four BYOD

    Hurdles to

    Consider

    BYOD Strains

    Corporate

    Wireless

    Bandwidth

    15 S O L V I N G T H E C H A L L E N G E S O F B Y O D

    AUTHOR

    BIOS

    LISA PHIFER owns Core Competence Inc., a con-

    sulting rm specializing in business use of emerg-

    ing Internet technologies. For nearly 30 years, she

    has been involved in the design, implementationand evaluation of networking, security and man-

    agement products.

    CRAIG J. MATHIAS is a principal with Farpoint

    Group, a wireless and mobile advisory rm in

    Ashland, Mass. Mathias is an internationally

    recognized expert on wireless communications

    and mobile computing technologies. Contact him

    at [email protected].

    JAMES FURBUSH is the news reporter for Search-

    Consumerization.com and contributes coverage

    on desktop, virtualization and cloud topics. Be-

    fore joining TechTarget in 2012, he was the man-

    aging editor of HyperVocal.com, an operations

    specialist at IBM, the founder of SlyOyster.com

    and a features reporter at The Patriot Ledger inQuincy, Mass. He graduated from Syracuse Uni-

    versity with a bachelors degree in American stud-

    ies and received a masters degree in journalism

    from Emerson College.

    Solving the Challenges of BYOD is a Search-Consumerization.com e-publication.

    Margie Semilof|Editorial Director

    Lauren Horwitz |Executive Editor

    Phil Sweeney |Managing Editor

    Eugene Demaitre | AssociateManaging Editor

    Laura Aberle | AssociateFeatures Editor

    Linda Koury |Director of Online Design

    Neva Maniscalco |Graphic Designer

    Rebecca Kitchens |[email protected]

    TechTarget275 Grove Street, Newton, MA 02466

    www.techtarget.com

    2013 TechTarget Inc. No part of this publication may be trans-mitted or reproduced in any form or by any means without writtenpermission from the publisher. TechTarget reprints are availablethrough The YGS Group.

    About TechTarget: TechTarget publishes media for informationtechnology professionals. More than 100 focused websites enablequick access to a deep store of news, advice and analysis about thetechnologies, products and processes crucial to your job. Our liveand virtual events give you direct access to independent expert com-mentary and advice. At IT Knowledge Exchange, our social commu-nity, you can get advice and share solutions with peers and experts.

    mailto:craig%40farpointgroup.com?subject=http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/mailto:[email protected]://reprints.ygsgroup.com/m/techtargethttp://reprints.ygsgroup.com/m/techtargetmailto:[email protected]://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/http://searchconsumerization.techtarget.com/mailto:craig%40farpointgroup.com?subject=