Bring Your Own Devices (BYOD) Survival Guide

Book description

Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.

Bring Your Own Devices (BYOD) Survival Guide explains the psycho-techno phenomenon also known as bring your own technology (BYOT). Providing the guidance necessary for living in this new world, it describes the new end-users (Millennials) and their demands, as well as the strategic and tactical ramifications of these demands.

Examining the business aspects of BYOD—selection, purchasing, and corporate culture—the book covers the broad range of technical considerations including selection, connectivity, training, support, and security. It also includes an extensive set of best practices.

The book is geared for the small- to medium-size enterprise that needs to integrate BYOD into their environment. It addresses topics such as content and data management, risk assessment, performance measurement, management, and even configuration management.

The text includes a set of Quick Start guides that provide tips for such things as assessing costs, cloud integration, and even legal issues. There is also a full set of appendices that supply helpful information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. About the Author
  7. Chapter 1 - The BYOD Revolution (1/3)
  8. Chapter 1 - The BYOD Revolution (2/3)
  9. Chapter 1 - The BYOD Revolution (3/3)
  10. Chapter 2 - Making a Financial Case for BYOD (1/7)
  11. Chapter 2 - Making a Financial Case for BYOD (2/7)
  12. Chapter 2 - Making a Financial Case for BYOD (3/7)
  13. Chapter 2 - Making a Financial Case for BYOD (4/7)
  14. Chapter 2 - Making a Financial Case for BYOD (5/7)
  15. Chapter 2 - Making a Financial Case for BYOD (6/7)
  16. Chapter 2 - Making a Financial Case for BYOD (7/7)
  17. Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (1/6)
  18. Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (2/6)
  19. Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (3/6)
  20. Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (4/6)
  21. Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (5/6)
  22. Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (6/6)
  23. Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (1/4)
  24. Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (2/4)
  25. Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (3/4)
  26. Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (4/4)
  27. Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (1/4)
  28. Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (2/4)
  29. Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (3/4)
  30. Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (4/4)
  31. Chapter 6 - Cloud Best Practices (1/3)
  32. Chapter 6 - Cloud Best Practices (2/3)
  33. Chapter 6 - Cloud Best Practices (3/3)
  34. Chapter 7 - Configuration Management in a BYOD Environment (1/5)
  35. Chapter 7 - Configuration Management in a BYOD Environment (2/5)
  36. Chapter 7 - Configuration Management in a BYOD Environment (3/5)
  37. Chapter 7 - Configuration Management in a BYOD Environment (4/5)
  38. Chapter 7 - Configuration Management in a BYOD Environment (5/5)
  39. Chapter 8 - Content Management, Mobile and Otherwise (1/4)
  40. Chapter 8 - Content Management, Mobile and Otherwise (2/4)
  41. Chapter 8 - Content Management, Mobile and Otherwise (3/4)
  42. Chapter 8 - Content Management, Mobile and Otherwise (4/4)
  43. Chapter 9 - Integrating BYOD into Resource Management (1/6)
  44. Chapter 9 - Integrating BYOD into Resource Management (2/6)
  45. Chapter 9 - Integrating BYOD into Resource Management (3/6)
  46. Chapter 9 - Integrating BYOD into Resource Management (4/6)
  47. Chapter 9 - Integrating BYOD into Resource Management (5/6)
  48. Chapter 9 - Integrating BYOD into Resource Management (6/6)
  49. Chapter 10 - BYOD Means Social Networking (1/4)
  50. Chapter 10 - BYOD Means Social Networking (2/4)
  51. Chapter 10 - BYOD Means Social Networking (3/4)
  52. Chapter 10 - BYOD Means Social Networking (4/4)
  53. Quick Start 1: Software-Based Authentication
  54. Quick Start 2: BYOD: Making It Work for Your Firm
  55. Quick Start 3: Software Selection from Multiple Packages
  56. Quick Start 4: The Make-Buy Decision
  57. Quick Start 5: Balanced Scorecard Metrics (1/2)
  58. Quick Start 5: Balanced Scorecard Metrics (2/2)
  59. Quick Start 6: Common BYOD Mistakes
  60. Quick Start 7: BYOD Corporate Policy
  61. Quick Start 8: Mobile Device Management Functionality Guide
  62. Quick Start 9: Legal Issues with BYOD
  63. Quick Start 10: Managing Online Content Checklist
  64. Quick Start 11: Selecting a Content Management System Checklist
  65. Quick Start 12: BYOD Lessons Learned
  66. Quick Start 13: BYOD Risks
  67. Quick Start 14: Getting Started with BYOD
  68. Quick Start 15: BYOD Security Tips
  69. Quick Start 16: Cloud Migration Tips
  70. Quick Start 17: Hitching Your Network to BYOD
  71. Appendix A: Security Glossary (1/2)
  72. Appendix A: Security Glossary (2/2)
  73. Appendix B: Employee Mobile Device Agreement
  74. Appendix C: Mobile Device Security Checklist
  75. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (1/9)
  76. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (2/9)
  77. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (3/9)
  78. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (4/9)
  79. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (5/9)
  80. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (6/9)
  81. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (7/9)
  82. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (8/9)
  83. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (9/9)
  84. Appendix E: Traditional IT Metrics Reference (1/4)
  85. Appendix E: Traditional IT Metrics Reference (2/4)
  86. Appendix E: Traditional IT Metrics Reference (3/4)
  87. Appendix E: Traditional IT Metrics Reference (4/4)
  88. Appendix F: Cloud Procurement Questions (1/2)
  89. Appendix F: Cloud Procurement Questions (2/2)
  90. Appendix G: Computer Use Policy
  91. Appendix H: Benchmarking Data Collection Methods (1/2)
  92. Appendix H: Benchmarking Data Collection Methods (2/2)
  93. Appendix I: Wireless Device Agreement
  94. Appendix J: Mobile Device Management Vendors
  95. Appendix K: Best Practices Security Checklist (1/12)
  96. Appendix K: Best Practices Security Checklist (2/12)
  97. Appendix K: Best Practices Security Checklist (3/12)
  98. Appendix K: Best Practices Security Checklist (4/12)
  99. Appendix K: Best Practices Security Checklist (5/12)
  100. Appendix K: Best Practices Security Checklist (6/12)
  101. Appendix K: Best Practices Security Checklist (7/12)
  102. Appendix K: Best Practices Security Checklist (8/12)
  103. Appendix K: Best Practices Security Checklist (9/12)
  104. Appendix K: Best Practices Security Checklist (10/12)
  105. Appendix K: Best Practices Security Checklist (11/12)
  106. Appendix K: Best Practices Security Checklist (12/12)
  107. Back Cover

Product information

  • Title: Bring Your Own Devices (BYOD) Survival Guide
  • Author(s): Jessica Keyes
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781466565043