fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Bringing Your Own Android and Developing a BYOD Policy

Written by SPK Blog Post
Published on September 11, 2014

The concept of letting employees bring their own phones and devices to work has become more and more common. Employees want to use their personal devices in the workplace without having to carry around a second device for personal use. While this helps with cost cutting and end-user happiness, it can lead to some security issues.

End users of personal Android phones can customize and modify the OS to get around some company policies set in place. One set of policies in particular deals with the Exchange device. Most companies require a pin or pass code as well as the ability to remotely wipe a device before allowing work email to be retrieved on the phone. While these can be useful security features, easy-to-access apps allow users to ignore both settings, getting emails on an Android device that will leave everything in the open if stolen.

Thankfully, the pain of this is getting easier with Android L. The new OS set to release later this year is introducing multiple profiles, a feature custom ROMs already have. This should allow users to have a separate, pin-locked work profile to access work email while their personal account is unlocked and readily available. The ease of switching between the two may lead to fewer users using third party work-arounds that block functionality.

Android is a great OS that can have locked down custom operating systems created for enterprise solutions, but unless that device is provided by the company a user has full control of their own phone. As a result, a bring your own device policy with Android devices that isn’t policed will be a security risk.

Next Steps:

Kaveh Nasouti
Systems Integration Engineer

Latest White Papers

DevOps Visibility and Metrics for Driving Business Value eBook

DevOps Visibility and Metrics for Driving Business Value eBook

To reliably measure the business value of the software developmentprocess, organizations need better visibility across the softwaresupply chain. How do businesses improve DevOps visibility, and how does this drive business value? Find the answer to these questions and...

Related Resources

PTC Windchill PLM and Autodesk Fusion Manage: Which is best?

PTC Windchill PLM and Autodesk Fusion Manage: Which is best?

When choosing a Product Lifecycle Management (PLM) software, it is important to thoroughly compare the solutions on the market. You have likely heard great things about the two we will be covering today. To aid in your decision, we will detail the unique features and...

How to Leverage Codebeamer and Windchill RV&S in Tandem

How to Leverage Codebeamer and Windchill RV&S in Tandem

Innovation is a pivotal factor in distinguishing products within the fast-paced industries of life sciences and healthcare. In order to stay at the forefront of innovation, organizations are on a continuous quest to enhance their Application Lifecycle Management (ALM)...