spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Bringing Your Own Android and Developing a BYOD Policy

Written by SPK Blog Post
Published on September 11, 2014

The concept of letting employees bring their own phones and devices to work has become more and more common. Employees want to use their personal devices in the workplace without having to carry around a second device for personal use. While this helps with cost cutting and end-user happiness, it can lead to some security issues.

End users of personal Android phones can customize and modify the OS to get around some company policies set in place. One set of policies in particular deals with the Exchange device. Most companies require a pin or pass code as well as the ability to remotely wipe a device before allowing work email to be retrieved on the phone. While these can be useful security features, easy-to-access apps allow users to ignore both settings, getting emails on an Android device that will leave everything in the open if stolen.

Thankfully, the pain of this is getting easier with Android L. The new OS set to release later this year is introducing multiple profiles, a feature custom ROMs already have. This should allow users to have a separate, pin-locked work profile to access work email while their personal account is unlocked and readily available. The ease of switching between the two may lead to fewer users using third party work-arounds that block functionality.

Android is a great OS that can have locked down custom operating systems created for enterprise solutions, but unless that device is provided by the company a user has full control of their own phone. As a result, a bring your own device policy with Android devices that isn’t policed will be a security risk.

Next Steps:

Kaveh Nasouti
Systems Integration Engineer

Latest White Papers

Which of CISA’s Six Types of SBOMs Are Right for You?

Which of CISA’s Six Types of SBOMs Are Right for You?

Are you interested in different types of SBOMs, but not sure which is right for you? Dive into this eBook to explore six different kinds of SBOMs and when to use them. What You Will Learn In this eBook, you will explore: Six kinds of SBOMs Which SBOM is best for you...

Related Resources

Ten Windchill PLM Strategies to Maximize Productivity and Reduce Costs

Ten Windchill PLM Strategies to Maximize Productivity and Reduce Costs

You will be taken to another page to registerBy submitting this form, I acknowledge receipt of SPK and Associates' Privacy Policy.Is your product lifecycle management system driving real business value—or just managing data?  In this practical and engaging webinar,...

PLM vs. PDM: Understanding the Key Differences for Engineering Teams

PLM vs. PDM: Understanding the Key Differences for Engineering Teams

Accelerating product development, improving product quality, and enhancing collaboration are all main priorities for designers and manufacturers. Achieving these goals requires the proper digital solutions for managing product data and processes. Product Lifecycle...