Mike’s “almost famous” BYOD recipe

Guest post written by Mike Jennett, Senior Program Manager, HP Enterprise Mobility

 

 

Twinkies.pngI was just listening to Jon Stewart interview NY Times writer Michael Moss about his new book Salt Sugar fat and he said something that struck a chord with me. He was talking about the science of creating food and something called the "Bliss factor." That perfect balance that will ensure that the products are a smash hit with consumers. That's where I want to go with BYOD policy. I've been searching for that perfect mix of hardware, software and education that will protect my IP—yet give my consumers that rush they get when eating a Twinkie. OK, I know it's a bit of flight-o-fancy to think that a BYOD policy can compare to a Twinkie (they are coming back!), but why not, why not venture out on that quest, at least for a little bit.

 Image courtesy of Flickr user Christian Cable.

 

What I'm really talking about here is balance— finding the balance between protecting corporate data and providing privacy—and there is no silver bullet to accomplish this. There are hardware products that can shut things down, there are software products that can white-list/black-list and there are harsh policy statements that companies can make that would make Dante sit back and rethink the number of circles. But, if you take a pinch of each, add a little love and tenderness, mix 'em up and cook them just right, then test them over and over until you find the right mix, you can find reach that "Bliss factor". Then your IT and Governance people can keep calm and carry on while providing world-class apps and services to your customers.

 

Adding your own special touch to the recipe

 

As you look at creating your own BYOD special sauce, you have to start with acceptance. BYOD is here, whether you allow it or not, it will occur to some extent. In a recent article for GNC.com, 9 keys to making BYOD work, Kevin McCaney referenced a great infographic that shows 81 percent of people surveyed use their personal devices for corporate data, and a whopping 66 percent say their company doesn't have a proper BYOD policy implemented. That second stat is a bit frightening and I would hazard to guess that a majority of those 66 percent work for companies that actually have BYOD policies, but the respondents were either unaware of them, ignored them, or just didn't understand them. That just goes to show that a policy isn't enough, it has to be a policy that makes sense from a corporate and consumer level. It has to be easy to maintain and is disseminated to the users in a proactive fashion.

 

With that in mind, here's a simple (well not really but that's what they say in the cookbooks) recipe for implementing BYOD.

 

Mike's Almost Famous BYOD

 

1 Secure gateway

1 MDM package

1 MAM package

A Pinch of Secure cloud

Bunch of Phones

Bunch of Tablets

Smidgen of Hybrids

1 Security policy

1 Data Governance policy

Little bit of sugar

 

Gently fold your secure gateway with your MDM and MAM packages, blend until smooth. Bake these ingredients until golden brown, this can take upwards of a couple years ;> unless you learn from the trials and tribulations of those who have gone before (do your research). Write a clear and concise security policy coupled with a governance policy that is distributed to both your internal developers and your end consumers. Be sure to tailor these policies to taste and add the little bit of sugar when sending out to the end users.

 

Let all ingredients sit and be reviewed for a bit on the counter by various groups including: security, support, marketing, infrastructure and legal. Once cooled, gently place on top of phones, tablets and hybrids, and “poof” you have a beautiful creation that provides that wonderful "Bliss factor" when consumed.

 

Sign-up here to start exploring HP Anywhere.

 

Mike Jennett is a highly respected tech industry award winner with an extensive background in technology focusing on emerging trends. He is currently the Senior Program Manager for Hewlett-Packard’s enterprise IT mobility deployment and has held various roles within HP over the past 12 years, including cutting-edge deployments in streaming video and virtualization. Prior to joining HP, he served as Chief Operating Officer for Spotlight Studios, an award winning branding and technology company that served both Fortune 100 companies and numerous start-ups. He is  also the author of two books on Microsoft technologies published by Osborne/McGraw-Hill press and he has been featured in numerous articles and interviews. Note that the views expressed on this blog are his own and do not necessarily represent the views of Hewlett-Packard. Follow him on Twitter at: @mjennett

Comments
Znz Make Money Online(anon) | ‎01-03-2014 02:01 AM
I believe this is among the most important information for me. And i'm glad studying your article. But should observation on few basic issues, The website style is ideal, the articles is in reality excellent : D. Excellent task, cheers
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
This account is for guest bloggers. The blog post will identify the blogger.


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation