1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Bringing Your Own Android and Developing a BYOD Policy

Published by SPK Blog Post
on September 11, 2014

The concept of letting employees bring their own phones and devices to work has become more and more common. Employees want to use their personal devices in the workplace without having to carry around a second device for personal use. While this helps with cost cutting and end-user happiness, it can lead to some security issues.

End users of personal Android phones can customize and modify the OS to get around some company policies set in place. One set of policies in particular deals with the Exchange device. Most companies require a pin or pass code as well as the ability to remotely wipe a device before allowing work email to be retrieved on the phone. While these can be useful security features, easy-to-access apps allow users to ignore both settings, getting emails on an Android device that will leave everything in the open if stolen.

Thankfully, the pain of this is getting easier with Android L. The new OS set to release later this year is introducing multiple profiles, a feature custom ROMs already have. This should allow users to have a separate, pin-locked work profile to access work email while their personal account is unlocked and readily available. The ease of switching between the two may lead to fewer users using third party work-arounds that block functionality.

Android is a great OS that can have locked down custom operating systems created for enterprise solutions, but unless that device is provided by the company a user has full control of their own phone. As a result, a bring your own device policy with Android devices that isn’t policed will be a security risk.

Next Steps:

Kaveh Nasouti
Systems Integration Engineer

Latest White Papers

Atlassian Cloud: Understanding Zero Trust Security

Atlassian Cloud: Understanding Zero Trust Security

Where To Start & Why It Matters What is the Atlassian Cloud Zero Trust Security model? Well, for decades, enterprise security controls were built to protect a large, single perimeter around a corporation. Often described as castle-and-moat security, This approach...

Related Resources

Why Process Automation Is Critical For Engineering

Why Process Automation Is Critical For Engineering

Process automation releases your engineers for the work their brains are intended for. That work is creativity and problem-solving.  By implementing process automation, you improve the team’s morale. Firstly, they get more focus time for deep work and designing better...

Deep Work Improves Engineers’ Productivity

Deep Work Improves Engineers’ Productivity

In this blog we'll explore how the principle of Deep Work by Cal Newport can improve your engineers productivity. Does it feel harder for you to focus on your creative, technical work? When I speak to engineers or management staff and ask this question, the answer...

Product Design: How to Eliminate 6 Bottlenecks 2022

Product Design: How to Eliminate 6 Bottlenecks 2022

This product design how to blog explains how virtual CAD can be utilized to eliminate the top 6 design bottlenecks in 2022.  Start-ups are emerging every day to disrupt the market. And established enterprises? They’re plugging more into research and development...