How BYOD is complicating data protection

Posted by Manny Veiga on May 22, 2014 11:00:00 AM

Find me on:

Mobile devices are in more workplaces everywhere – and that makes life even more difficult for IT administrators who must manage these devices.

That’s especially true when it comes to data protection, and as described in a recent TechTarget blog, the influx of mobile devices and BYOD makes data backup a bigger challenge for the channel.

Enterprise mobility seems an inevitable priority for the immediate future, as the competitive edge that comes with a mobilized workforce is critical in the modern marketplace.BYOD_image

And as Ron Miller wrote in a recent Intronis blog, most businesses would probably be better off embracing the benefits of BYOD then resisting and implementing an oppressive policy.

According to TechTarget, one of the backend considerations that must be covered in BYOD policies is the ways in which data will be managed, stored, protected and backed up when it comes from smartphones and tablets. 

On top of that, the fact that there is such a diverse array of mobile devices on today's market makes it tricky to keep all that data protected.

TechTarget presented two popular options for IT pros who currently support BYOD:

  • Use a file sync and share solution to move mobile data to the cloud
  • Keep corporate data off the device altogether and instead enable users to log in to access corporate data remotely

The latter is probably safer given that it ensures that no corporate data is lost if the mobile device is stolen or misplaced - since no data was stored on the device in the first place.

Of course, virtualization offers a third option, and as we wrote last fall, some experts believe this technology is the key to mobile data protection

Whatever path you choose, it's worth investigating any available options for BYOD. After all, research firm Gartner estimates that 70 percent of employees will conduct business on their mobile devices by 2018. That means a lot of potential data could be at risk - or already is.

Backup and Recovery in a Virtual World Intronis

Topics: Mobile Device Management

Which Data Loss Gremlin Is Targeting You
MSP Health Check
MSP Phishing Quiz
Intronis Local Lunches
MSP Marketing Assessment