Abstract

Two different ways of adopting Bring Your Own Device (BYOD) policy in an enterprise are either contracting it out to vendor or building custom made BYOD solution with a set of independent security mechanisms and organizational policies. A comparative analysis of the two types of BYOD solutions has been performed to assist enterprises that consider ways in adoption of BYOD policy other than contracting it out to a vendor. In addition to the comparative analysis, this research outlines residual risks to help enterprises determine the suitable type of BYOD solution for their needs. To analyze BYOD risks, major risk areas such as lost & stolen devices, unauthorized third party applications, etc. have been analyzed. For all these risk areas, risk mitigation techniques were outlined and residual risks have been analyzed using risk scenarios derived from widely accepted industry standards suggesting the best practices. This research work adds as an additional source document to the knowledgebase of BYOD.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call