Security Aspects In Byot

Read Complete Research Material

SECURITY ASPECTS IN BYOT

Security Aspects In Bring Your Own Technologies (BYOT)

Security Aspects In Bring Your Own Technologies (BYOT)

Introduction

BYOT (bring your own technology) is referred as the policy or law that allows the employees or work force to bring their personal technologies or devices including smart phones, tablets, laptops etc., to their organizations or work places. It is often observed that, these technologies or devices may play a vital role in providing benefits to the applications and information of the company. In addition to this, the policy of BYOT can also be applied on the students and educational institutions. On the other hand, it is also necessary for the organizations to consider appropriate aspects of security in the BYOT (Keyes, 2013, pp. 54-55). According to recent researches and studies, certain changes in the term “BYOT” may include BYOL (bring your own laptop), BYOC (bring your own computer) and BYOPC (bring your own PC). This study incorporates the evaluation of security aspects in BYOT including an appropriate planning. This planning may greatly help businesses and organizations in ensuring the integrity of the organizational processes. This planning may include various features including policy, risks and benefits of BYOT and proper guide lines, to make full use of this technology.

Discussion

Evaluation of Security Aspects in BYOT in Enterprise Network

It is a fact that, BYOT (bring your own technology) has brought various changes and advancements in the business procedures. It is because of the reason that, this technology allows the organizations to minimize the infrastructure cost or cost of installing different technologies and network (Gilbert, 2005, pp. 23-26). In this scenario, the security of organizational integrity is one of the biggest concerns for the organizations. It is because of the reason that, employees use the same technology at their work places as well as in their ...