Our employees USE devices which they are comfortable with

More than 20% of the employees in IT/ ITeS sector use personal devices, and over 70% of companies have or are in the process of formulating an enterprise policy for BYOD (Bring Your Own Device). To discuss this implementation and
its merits in detail and also on how companies are implementing enterprise mobility to increase workforce productivity, thereby bringing in a culture of BYOD,
Dataquest Spoke to Mandar Marulkar, Head, IT & Chief Information Security Officer (CISO), KPIT. Excerpts

There has been lots of talk about the growing
BYOD adoption in enterprises. But critics say
that there is too much hype and rhetoric. As
a CIO what is your take and at what stage are
we in BYOD?
According to a report by Gartner, by 2016 over 30% of
BYOD strategies will leverage personal applications, data
and social connections, for enterprise purposes. A report
by Juniper Research has forecasted that the number of
employee-owned smartphones and tablets used in the enterprise will exceed 1 bn by 2018, as the growing trend of
BYOD (Bring Your Own Device) redefines business connectivity.
The rapid rise in adoption of tablets, android-based
devices and iOS amongst employees has compelled companies
to allow employees to use their personal mobile devices
to access the corporate network. Most of the companies
have already enabled BYOD for smart devices for
accessing productivity applications, collaboration tools and
business apps on the employee owned devices and are in
process of deploying MDM/MAM solutions. BYOD will not
be restricted only to smart devices, but companies will also
allow employees to bring their own laptops at work in coming
years. The introduction of BYOD will also mean CIOs
taking extra steps to secure their networks and information
assets more efficiently.
Along with BYOD adoption, one can see lots of security
concerns. Companies respond by toughening up
BYOD polices. Is this a good countermeasure?
Business mobility has increased in the new world workplace
with an increasing number of employees working remotely.
Sensitive company data is being accessed from different
parts of the world from secure or unsecure sources. Given
the portable nature of the mobile device, corporate data is
increasingly transmitted outside the corporate network and
stored on mobile devices outside the physical boundaries
of the organization.
One of the best ways to ensure that the company’s data
is safe as well as maintain corporate data security is though a comprehensive mobile device management and access
strategy. These should be created by the company proactively
to develop, educate, enforce, and maintain an enterprise-
wide BYOD policy. An effective data leak prevention
security solution should be an extension of the standard
enterprise security mandate, but engineered specifically for
the realities of mobility.
In order to be effective, an enterprise BYOD strategy
needs to address: Securing the mobile device and its data,
Securing the communications to and from the mobile device
to the corporate network and Optimising the enterprise
network to support Business Mobility.
Organizations need to build solutions which can give flexibility to users in using their devices efficiently for personal use as well as enable companies to control business data access and its security. Success of BYOD depends on balancing flexibility and control with the right set of policies, processes and technologies.
Do you see such trend in your organization?
While KPIT is a global technology company specializing in
product engineering and IT consulting, we also have an inclusive corporate culture. Our employees do have the option to use devices with which they are comfortable, however we take appropriate measures to ensure that our data
and networks are secure. We have published BYOD policy
and we are investing in various technologies which can help in extending more and more services to end users on their
personal devices.
If yes, what steps have you taken to deal with employees
demand for bring their own devices and at the
same time ensuring secure work environment?
As a part of BYOD policy, we have recommended certain
models and operating systems which are tested for business
applications for security, performance, and remote
manageability. We are implementing enterprise mobility
solutions from Microsoft which gives simplified access to
corporate services and also enables KPIT to manage end
user devices/data seamlessly.
Today experts believe that BYOD is giving birth to
BYOA (Bring Your Own Application). Do you think this
trend will add another worry in the CIO bucket?
According to Gartner, the number of employees using
mobile apps at work is poised to double by 2015; and
the influx of new devices into the enterprise will expend IT
resources. As this trend grows, it is essential that companies which allow employees to bring their own devices to work assess how to manage them in order to protect company
data. This means implementing company wide business
security solutions and mobile device management
policies. CIOs should prepare for an environment where
employees choose apps of their own choice, and must
find tools that protect and manage the risks of viruses and
data loss.
What steps should CIOs follow to deal with employees
demands when it comes to use of wearable technologies
at their workplace?
A recent IDC report stated that wearable technology took a
huge step forward over the past year and predicted shipment
volumes will exceed 19 mn units in 2014, more than
tripling last year’s sales. From there, the global market will grow to 111.9 mn units in 2018, resulting in a compound
annual growth rate of 78.4%.
CIOs need to prepare for company employees to bring
their devices to work. Before wearable technologies become
the norm at the company, CIOs will need to explore
policies that cover individual as well as corporate use of
these devices. Some of the questions to consider will be:
Which devices will the IT team support? Would corporate
security polices require a centralized ability to lock and/or wipe data from devices? What is the company’s policy on data standards? The answers to these questions will go a
long way towards creating a comprehensive strategy for
wearable technology in the workplace.
Deepdive | Mobility

Mandar MarulkarRuchika Goel | dqindia

Leave a Reply

Your email address will not be published. Required fields are marked *