Welcome!

Containers Expo Blog Authors: Liz McMillan, Pat Romanski, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

Related Topics: Containers Expo Blog, Mobile IoT, Microsoft Cloud, Agile Computing, @CloudExpo, Cloud Security

Containers Expo Blog: Article

Can Virtual Desktop Infrastructure Improve BYOD Security Issues?

VDIs Can Solve Several Common BYOD Concerns

Bring Your Own Device policies have fascinated both the corporate world and the tech world for some time now. Part of the allure is the added productivity and the added ease of use for workers. But, that doesn't explain why there are thousands of tech pieces on BYOD policies, failings and warnings. The truth is, we're all fascinated by how it flawlessly bridges the gap between home and work life.

BYOD first sprung up as Millennials demanded more flexibility, more control. They wanted less of a barrier between work and home life, and working from their iPads while watching Netflix at home struck the perfect balance.

Then, there were the problems that inevitably followed. Companies realized that employees' devices are almost never as secure as corporate machines. When devices got stolen, there weren't many options to deal with the situation, and sensitive company information fell into strangers' hands.

Businesses tightened security on the devices that participated in the program, and employees began to realize what that means. Some BYOD policies began to include total remote wipe abilities and geo-locating capabilities. Employees pushed back, some sued and policies changed. Now, most offices have given up remote wipes and using the phone's GPS for any in-house apps.

The top thinkers in the tech space haven't quite found the magic bullet to alleviate all security and consistency concerns for the consumerization of IT yet, but there are signs they're getting closer. Stemming from these conflicting needs of security and privacy, more solutions were searched out. The best and the brightest came up with using Virtual Desktop Infrastructures. VDIs run virtual desktops right from the company servers, which the company is free to lock-down as much as they feel like they need to.

Traditional BYOD policies had two main concerns: Companies worried about security; employees worried about privacy. VDIs are almost perfectly suited to solve these BYOD issues.

Security Issues
Company data doesn't live on the employee device so remote wipes aren't necessary. If an employee loses their device, their account can simply be denied access. Firewalls are put in place on the company server side; not on the employee device. There are still some limited security concerns, but the practice has been deemed good enough to house medical records.

Privacy Issues
Employees are working on a virtual machine that doesn't require the permissions that an app might. There's no geo-locating need, since the company data is secure on the company servers. The company has no need to look at phone data, because nothing on the virtual server will be affected by it. In terms of employee privacy, it's as near a perfect solution as can be found with our current technology.

Incompatibility Issues
Kindle Fires, Nooks, Nexuses and iPads don't all run the same software. Sometimes programs aren't available for each device at all, other times employees just haven't invested in them. Instead of forcing the entire office to purchase mobile versions of Microsoft Office, access virtual machines on them so they can all have access to the same software they use at their desks. Of course, this means that they can still use the same firewall and security programs as well.

In a world where the only thing valued more than company security is individual privacy, tech experts are trying to find the perfect solution to the BYOD dilemma. Virtual Desktop Infrastructures have burst back onto the scene just in time to offer some glimmer of hope that everyone's priorities can be met.

More Stories By Amy Bishop

Amy Bishop works in marketing and digital strategy for a technology startup. Her previous experience has included five years in enterprise and agency environments. She specializes in helping businesses learn about ways rapidly changing enterprise solutions, business strategies and technologies can refine organizational communication, improve customer experience and maximize co-created value with converged marketing strategies.

Connect with Amy on Twitter, LinkedIn, Google+ or Pinterest.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...