ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

Five steps to maximise BYOD benefits without compromising data

By Heather Wright
Tue 13 Oct 2015
FYI, this story is more than a year old

For all its benefits, BYOD remains a potential nightmare for businesses concerned about data security, but Acronis says having the right tech and systems in place can ensure companies make the most of BYOD without compromising data.

Lincoln Goldsmith, Acronis Australia and New Zealand general manager, says BYOD brings with it new data protection and security concerns for IT departments, raising questions such as who is accessing critical company data and files.

“For many IT departments this question alone, is ground for concerns,” Goldsmith says.

“Adapting to the BYOD landscape isn’t so much about devices, as it is about accessing the files and data and using it to interact with other employees or customers,” he says.

“To ensure productivity, companies need to create a seamless experience for employees as they work across multiple IT platforms, in multiple environments and through multiple channels.”

Goldsmith says there are five key steps for organisations wanting to take control of BYOD, which resellers can advise and aid customers with:

Mobile device management (MDM) is a fundamental first stage for security in the BYOD world, Acronis says. “MDM is all about centralising the management of the devices employees are using for work, whether at home or in the office.

“That way, workers will have the freedom to use whichever device they want, and IT can monitor access and use, ensuring there’s not data leakage.”

Mobile file management (MFM) Once devices are secured, employees still need to access the files and content they use every day to do their jobs. Acronis says MFM guarantees that IT can have complete and secure control over which files are accessed, modified and deleted, enabling companies to go beyond managing devices by directly managing the sensitive data being accessed and used on them. 

Bridge the old with the new The BYOD revolution started with MDM, and functionality is expanding with MFM, but now that mobile is a native platform for employees there are countless productivity apps that are meant for use on-the-go.

When employees travel for work, it’s taken for granted that they’re going to bring personal devices on the trip and use them to check email, collaborate on projects, and manage customer relationships. 

Mobile-only apps As mobile becomes a way of life for workers, there will be an explosive growth in apps that are exclusively designed for mobile environments. Mobile-only apps have a very distinct advantage, because they are built with the knowledge that people will be using them on small touchscreens and constantly be moving around. 

Bridging the new back to the old After the rapid development of mobile apps, there are going to be bridges built in the other direction. Just like mainframes never fully went extinct, desktops and the functionality they bring to the working world will remain relevant. So, new-world mobile apps will need to build bridges back to old-world infrastructures and interfaces. 

Goldsmith says by recognising the steps and implementing the technology and processes underpinning them, companies can get the most of their employees’ devices, without compromising security.

“With devices acting as the platform for an affordable, connected, data-driven workplace, putting the power of choice back into the hands of the employee becomes mutually beneficial for a company and its employees.”

Related stories
Top stories
Story image
Artificial Intelligence
SAS unveils AI experience to improve kids' batting abilities
SAS has created The Batting Lab, an interactive experience using AI, computer vision and IoT analytics to help kids improve their baseball and softball swings.
Story image
PaaS
New digital traffic light system to tackle construction defects
Smarter Defects Management launches its PaaS digital system and says it will revolutionise managing defects in the construction industry.
Story image
Testing
Google and CSIRO use AI to help protect the Great Barrier Reef
Google has partnered with CSIRO in Australia to implement AI solutions that help protect the Great Barrier Reef.
Story image
Fortinet
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
Review
Hands-on review: MSI MPG Z690 Carbon WIFI motherboard
It’s all change with Intel’s 12th generation CPUs. We have a new chipset in the 600-series, a new socket with the LGA 1700, and new DDR5 memory.
Story image
D-Link
D-Link launches new G415 Smart Router as part of EAGLE PRO AI range
D-Link A/NZ has announced the launch of its new G415 AX1500 4G Smart Router as part of the new EAGLE PRO AI Series.
Story image
Malware
Sharp increase in phishing as cybercriminals leverage SEO to lure victims
"Malware lurking everywhere, from cloud apps to search engines, leaving organisations at greater risk than ever before."
Story image
Review
Hands-on review: Amazon Kindle Paperwhite Signature Edition
In almost every respect it works like a book, apart from the fact that it weighs next to nothing, fits in my hand perfectly, and is soothing on my eyes.
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Manufacturing
HINDSITE wins Aerospace Xelerated Pitch Challenge with solution to support Boeing
Brisbane-based startup HINDSITE was the winner of the first ever Pitch Challenge organised by Aerospace Xelerated in partnership with Queensland XR Hub. 
Story image
Microsoft
Avaya expands Microsoft partnership to deliver OneCloud on Azure
The joint technology and go to market agreement will help customers accelerate their digital transformation initiatives in the cloud.
Story image
Phishing
Google reveals new safety and security measures for users
Google's new measures include automatic two step verification, virtual cards and making it easier to remove contact information on Google Search results.
Story image
Mobility
Hands-on review: STM laptop bags
The advent of hybrid working has meant we need laptop bags. We got our hands on two of the most popular laptop bags from STM.
Story image
VPN
Palo Alto Networks says ZTNA 1.0 not secure enough
Palo Alto Networks is urging the industry to move to Zero Trust Network Access 2.0 because previous versions have major gaps in security protection.
Story image
Hybrid Cloud
Hewlett Packard Enterprise hosts Channel Reignite sessions
Hewlett Packard Enterprise (HPE) hosted its HPE Channel Reignite sessions in Sydney and Melbourne last month to reconnect with the channel partner community.
Story image
Gaming
Mastercard users can now use rewards points in gaming
Mastercard has launched Mastercard Gamer Xchange (MGX), allowing APAC consumers to convert their rewards points into gaming currency.
Story image
Wireless
Sony to bring new 1000X series WH-1000XM5 headphones to the market
Sony has announced the newest edition of its award-winning wireless headphones, with the 1000X series WH-1000XM5 noise-cancelling model.
Story image
Telstra
Telstra and Silver Trak Digital delivers 5G to the cinemas
Telstra and Silver Trak Digital say they've launched Australia's fastest and most secure delivery of content over 5G for cinemas.
Story image
Artificial Intelligence
Google to enter the smartwatch market with the Google Pixel Watch
Google has provided a first look at its new Google Pixel Watch, which is set to make an entry into the competitive smartwatch market.
Story image
Artificial Intelligence
Updates from Google Workspace set to ease hybrid working troubles
Google Workspace has announced a variety of new features which will utilise Google AI capabilities to help make hybrid working situations more efficient and effective.
Story image
Microsoft
Microsoft unveils adaptive accessories for disability access
Microsoft is introducing an expansive Inclusive Tech Lab to give people with disabilities greater access to technology through new software features and adaptive accessories.
Story image
Adyen
Adyen expands partnership with Afterpay as BNPL payments increase
Adyen has expanded its partnership with AfterPay allowing more of Adyen’s merchants in more countries worldwide to use the BNPL provider.
Story image
Ransomware
Ingram Micro Cloud adds Bitdefender solutions to marketplace
Ingram Micro Cloud has announced the expanded availability of Bitdefender solutions on the Ingram Micro Cloud Marketplace.
Story image
Logistics
TeamViewer and SAP combine AR and warehouse operations
TeamViewer combines its AR platform, Frontline, with SAP's Extended Warehouse Management solution, to make warehouse and logistics operations more efficient.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Data
Aussie data & analytic execs not confident in data strategy
Less than half of Australian data and analytics leaders are confident in their data strategy as siloes and lack of culture prevent innovation.
Story image
Corsair
Hands-on review: Corsair 32GB Vengeance 5200MHz DDR5 DRAM kit
Corsair’s Vengeance 5200MHz DDR5 DRAM offers PC users an entry-level upgrade to the new memory standard allowing them to get a little bit more out of their new Alder Lake CPUs.
Story image
Microsoft
SAS Viya on Microsoft Azure to deliver 204% return - study
The Forrester Total Economic Impact study finds SAS Viya on Microsoft Azure brings a 204% return on investment over three years.
Story image
Nokia
Nokia and Optus reaches new 5G levels using Samsung
Nokia and Optus have achieved the world’s first 3CC Carrier Aggregation 5G SA data call using a commercial Samsung headset in Australia.
Story image
Hybrid Cloud
Red Hat and Accenture expand alliance for hybrid cloud
Red Hat and Accenture have announced the expansion of their partnership, collaborating on new offerings to assist businesses in their cloud continuum operations.
Story image
Ransomware
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
Training
Fortinet training edges toward closing cybersecurity gap
The Fortinet Training Institute has made significant progress in closing the cybersecurity skills gap, on track to train one million people by 2026.
Story image
Tech job moves
Tech job moves - Datacom, Micro Focus, SnapLogic and VMware
We round up all job appointments from May 6-12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Cybersecurity
Three key security challenges facing the Australian insurance industry 
Insurance companies must ensure they proactively address security challenges and protect the privacy of customer data.
Story image
Application Performance Monitoring / APM
Why SolarWinds Partners will have big wins in 2022
We summarise the key recent changes that the monitoring software vendor has made to accelerate its channel business.
Story image
Hawaiki Cable
BW Digital completes acquisition of Hawaiki Submarine Cable
BW Digital has completed its full acquisition of Hawaiki Submarine Cable, with all applicable regulatory filings and approvals now received.
Story image
Appian
Appian awarded billions in damages against Pegasystems Inc.
Appian has been awarded USD$2.036 billion in damages against Pegasystems Inc as the result of a jury verdict in the Circuit Court for Fairfax County, Virginia.
Story image
Malware
Use of malware, botnets and exploits expands in Q1 2022
"As zero-day attacks and other vulnerabilities among companies like Google and Microsoft come to light, threat actors are quickly adjusting their tactics."
Story image
Red Hat
Red Hat expands capabilities to provide streamlined application development in cloud
"Application development is undergoing significant change and developers need tools to support this transformation."
Story image
Ransomware
Zerto unveils updates to ransomware recovery capabilities
"Organisations face increased risks from the volume and sophistication of ransomware attacks prevalent today."
Story image
Artificial Intelligence
SAS launches human-focused responsible innovation initiative
SAS has launched a responsible innovation initiative, furthering its commitment to equity and putting people first.
Story image
Cybersecurity
HackerOne launches Attack Resistance Management solution
HackerOne has launched Attack Resistance Management - a new category of security solution that targets the root causes of the attack resistance gap. 
Story image
Artificial Intelligence
ANU and Seeing Machines to use AI to improve driver safety
The Australian National University and Seeing Machines have won a grant to develop AI systems monitor human behaviour while driving.