Tips for a Successful BYOD Implementation

Home  >>  Business Profitability  >>  Tips for a Successful BYOD Implementation

Tips for a Successful BYOD Implementation

Bring Your Own Device (BYOD) has first made a buzz in 2009 when large organisations recognised the need of employees to bring their personal devices to work and connect it to the corporate network. In 2011, the acceptance for this trend has reached an all-time high when the report from Aberdeen Group revealed that 75% of enterprises now had a BYOD policy.

Today, this phenomenon is becoming a trend across different organisations nowadays because of its added benefits such as increased employee satisfaction, cost savings, and increased productivity. In fact, the latest report from Tech Pro has reported that 72% of organisations surveyed were allowing BYOD or planning to adopt the policy in the next few months.

If you are feeling left behind on this trend, then worry yourself not. In this post, we have gathered some actionable tips that will help you implement an effective BYOD policy in your workplace.

1. Be Specific on Allowed Devices

During the early years of BYOD, it is a known fact that Research in Motion’s Blackberry devices is the most prevalent devices that employees usually brings into their workplace. Today, the majority of the people either have Apple’s iOS and Google’s Android-based smartphones and tablets in their hands and pockets, so you have to specify which type of device is only permitted to connect to your corporate network.

2. Implement 2- Factor Authentication

In a corporate world, static passwords would not suffice to protect important business information against unauthorised access, especially when implementing BYOD policy in the company. People usually operates their personal devices without any password or lock patterns because they see this as an obstacle when accessing their own files or apps.

In this situation, it is important that all employees understand how sensitive and confidential your business transmit through your network, and enforce a 2-factor authentication on their device each time they attempt to access your system. Some of the two-way factors that you can try are the password- security question combination or a password-captcha combination.

3. Use Sandbox

One of the best ways to protect your business systems from any data leakage and malware is through sandboxing. Sandboxing allows the user to run an application in a separate environment so that if errors or security threats arises, those issues will not spread to other areas on the computer.

There are some mobile security programs available in the market such as Fixmo SafeZone and MobileIron which has a built-in sandbox capabilities, which allows the user to specify which applications to run in a sandbox and which are not.

4. Consider Virtual Desktop Infrastructure

Virtual Desktop Infrastructure (VDI) refers to the practice of hosting a desktop operating system within a virtual machine (VM) running on centralised server. This allows the user to access and use office-based computers and applications even when they are home- regardless of what type of device they have. Because no actual data is stored on the employee’s personal device, issues like data leakage is not a concern here.

However, there are also some considerations when deploying VDI application in your business. For instance, if the application being virtualised only receives updates every 2 years or so, then the user might have a hard time creating another image of the app from which all virtual machines will be based on. You can check this link for more considerations about VDI.

5. If VDI is Not Possible, Try Native Containerisation

Native containerisation allows you to create two separate user profiles on your employee’s personal device – one for work and one for personal use. It includes the following features:

  • App Tunneling- Business can allow approved apps to use an App tunnel to securely connect to the and corporate networks.
  • Single Sign-in- Enable Single sign-in on different enterprise apps, leveraging existing identity management solutions.
  • Conditional Access- Restrict apps to run on approved and compliant devices
  • App Configuration- Auto-configure URL/Port settings, group codes, email addresses and license keys to the need to educate users about the set-up.
  • Security Policies- Enforce security policies, such as required encryption and data loss protection at the app level.

Native containerisation is the most user-friendly among other methodology. It also honors OS privacy notices and consent statements, thus protecting the privacy of the users.

Customer Support

Image from Pixabay

6. Establish Service Policy

You must inform your employees about the responsibility on your part if ever their personal device encountered any issues and problems. Here are some considerations in establishing a service policy:

  • The level of support that will be provided for initial connections of a personal device to the corporate network.
  • Type of support that IT representatives will provide to broken devices.
  • Type of support to applications installed on the devices.
  • Limit of Helpdesk to ticketing problems with email, calendaring, and other personal information management-type applications.
  • Provision of loaner devices for employees while their device is being serviced.


These are just of the tips that can increase your chance of adopting the BYOD policy in your company. To gain the best result, it is important to work hand in hand with your employees so they can properly acknowledge how BYOD impacts your business and how vital their role is in keeping your business information safe and secured.

The following two tabs change content below.

David Younger

CEO and Managing Director at The Service Manager
David Younger is Australia’s #1 Cash Flow Expert For The Field Service Industry. Over 25 years working with hundreds of field service business owners in virtually every industry, David has discovered the ultimate path to plugging up the “profit holes” in a growing business that will take it to the next level.
Privacy Policy | Terms and Conditions | Sitemap