Click here to close now.


Agile Computing Authors: Janakiram MSV, Jason Bloomberg, Jayaram Krishnaswamy, Joe Pruitt, Victoria Livschitz

Related Topics: Cloud Security, Java IoT, Mobile IoT, Agile Computing

Cloud Security: Article

Defining BYOD Policies

In 2013, analysts say there was an 81% growth of mobile devices worldwide.

The rise of mobile is still going strong and it shows no signs of stopping!, In 2013, analysts say there was an 81% growth of mobile devices worldwide.

Actually, according to the new Cisco report - "Mobile Data Traffic Forecast Update" - the mobile traffic in 2013 was 18 times the size of the entire internet in 2000. The study reports that in 2013 the internet traffic per user averaged 356MB of data a month. Even more amazing, is that the trend expects it to increase to 3GB per user in 2018.

All of these changes - the use of mobile data, the internet of things - all have real world applications on our businesses. Now, if you've been getting comfortable with BYOD so far, be careful with the expected twists and turns. More and more devices are being introduced to the market, new services and apps as well. Despite the turbulent start, everyone seems to be jumping on the BYOD wagon; but some companies, who are not planning ahead, should really start looking forward for those upcoming pot holes. CIOs can expect real security threats to emerge, hidden costs, legal affairs with employees and many other issues... The solution? An effective policy covering all angles of the BYOD practice from all its perspectives and of course an MDM tool.

Over the last months organizations' employees have embraced the BYOD practices, CIOs are concerned about security issues, lawyers have given their advice, and MDM vendors have taken their message to the companies. But while CIOs try to come up with the best solution to police this practice, users continue to buy more products and increase the type of devices.

Aberdeen considers that understanding what is going on is a must. They ran a survey this January to find out that 3 of 4 responders have a BYOD program in place; yet two thirds of these plans are not enforcing compliance, security, or legal policies.

Mark Charleton from Blue Solutions told us that CIOs are concerned and thankful with the MDM vendors for pushing their messages of compliance and security to the business managers. This helps them to take this topic to the management table in order to become a BYOD enabler together with the other operational areas including HR, Sales, Marketing, Operations and Legal.

However, all these concerns about hidden costs and hard-to-measure worker productivity don't matter to the employees as their convenience to have business and personal lives blended in one single device. Somehow the tables have turned, the employees are in the driver's seat!

The Dirty Little Secret

Horror... horror!

When it comes to BYOD expense reporting, employee's behavior isn't exactly criminal, but it is cheating. The temptation to submit a huge expense report for the personal smartphone that might have been used for work purposes could be too high to resist.

According to the mobile consultancy "Network Sourcing Advisors," even when the BYOD policies clearly state otherwise employees include their family plans, upgraded phones and termination fees to their BYOD expense plans. Executive globe-trotters would rack up huge international charges and float them past the inattentive eyes of finance.

Companies often counter this abuse by putting a monthly stipend or cap on reimbursement. But let's be honest, most people will ask for the highest stipend and sign up for the biggest data plan so that they won't be hit with overage charges.

The fact is that employees don't really want to pay for their smartphones, tablets, and laptops. They just want an easy-to-use device for their work and their personal life, and of course it is better if the company pays the bill.

This trend is racing towards chaos in the 2014. The number of smartphones, tables and even Laptops under the BYOD umbrella is increasing by day. Complications and confusions are forcing changes to BYOD policies.

Can you COPE?

Some few companies have enabled a hybrid approach called COPE - Company Owned, Personal Enabled - model. COPE is the opposite of BYOD. Businesses using a COPE strategy provide their employees with IT devices and gadgets to be used and managed by them; the companies maintain ownership of such devices, so they can monitor and control their activity to a complete degree. Besides business purposes, employees can use their devices for their personal activities. COPE may be a less expensive option that BYOD, in which employees are often reimbursed for all or part of the cost of the devices they buy. This is because if the company buys devices, it can generally get them for less than retail price. COPE also gives the company more power in terms of policing and protecting devices, thus reducing many of the BYOD risks.

In 2014 and 2015 companies not using COPE will put practical BYOD programs and policies in place. Both mobile models imply the need to accelerate the businesses and move to SaaS. To those that can't COPE, modernize their core applications and become mobile friendly will become a must.

More Strict BYOD Policies

Let's face it, not all companies have budget enough to COPE; so BYOD will yet continue to be a growing trend. Sooner or later, these companies will need to develop effective BYOD policies. Policies should be defined in each area according to the employees activities and needs, to then be detailed and defined mainly by the Finance, Human Resources, and Legal departments that will be in charge of the available budgets and the legal implications that follow.

Once these policies are set up, they can be merged with an MDM tool, this way all the devices would be safely managed and controlled by the responsible areas.

BYOD Lawsuits Loom as Work Gets Personal

Will BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Companies better make sure they have an explicit terms-of-use BYOD agreement.

Like most tragic love stories, the BYOD affair may end up abruptly. In the early days of BYOD, say, 2013, employees fell madly in love with the idea of using their own iPhones, Android smartphones and new tablets for work. They could finally ditch corporate-issued and boring cell phones.

In a beginning BYOD promised that employees and employers would live happily ever after. But the BYOD romance suddenly turned sour. Employees are now questioning the intrusion of corporate eyes on their personal devices. Why did the Internal IT turn their beloved smartphone into a spy that tracks their whereabouts? Employees are beginning to sense companies taking advantage of BYOD by intruding on personal time to get free work time.

If CIOs have hourly employees with BYOD smartphones, they might want to leverage MDM to control the company's email security and delivery rules to those devices; meaning, they can set a business rule that won't allow delivery of corporate email to a subset of users during off-hours. This rule should be also addressed in the BYOD terms-of-use agreement. This is just an example, and the tip of the iceberg.

John Timko, Marketing Director in LabTec Software explained that MDM software has thankfully advanced quickly and has come up with a fix. Now companies can control only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. While this helps tremendously, it doesn't completely solve the problem.

Let's say a company buys the popular productivity app, Evernote, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time regardless of the personal data the employee may have added such as a shopping list, recipes, vacation plans, or perhaps something more critical to their job.

In conclusion, companies need to have better protections against employee's lawsuits regarding the BYOD practice, a well developed terms-of-use agreement, and leverage MDM to ensure this agreement is followed. Truth is, employees tend to get a bit emotional when their privacy is being violated or their location is being tracked via a mobile device that they personally own. They don't like their personal data to be seen or wiped, either. When these things happen, companies can expect the wrath of a scorned employee.

More Stories By Monica Paul

Monica Paul is a marketer with 20 years experience in local, regional, and global marketing strategies. In 2001, after 8 years working as an employee for several IT companies such as Micrografx and Visio; Monica founded Marcomtec, marketing firm giving services initially to the IT industry that then diversified to other industries. In 2013 Monica launched, Magic MasterMinds (, a marketing platform to help writers all over the world to market their books leveraging this way reading as a daily activity.

@ThingsExpo Stories
Electric power utilities face relentless pressure on their financial performance, and reducing distribution grid losses is one of the last untapped opportunities to meet their business goals. Combining IoT-enabled sensors and cloud-based data analytics, utilities now are able to find, quantify and reduce losses faster – and with a smaller IT footprint. Solutions exist using Internet-enabled sensors deployed temporarily at strategic locations within the distribution grid to measure actual line loads.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends and technology requirements that will drive the Internet of Things from hype to reality.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w...
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you!
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd...
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
SYS-CON Events announced today that Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, will keynote at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.