fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Bringing Your Own Android and Developing a BYOD Policy

windchill features best plm software
Written by SPK Blog Post
Published on September 11, 2014

The concept of letting employees bring their own phones and devices to work has become more and more common. Employees want to use their personal devices in the workplace without having to carry around a second device for personal use. While this helps with cost cutting and end-user happiness, it can lead to some security issues.

End users of personal Android phones can customize and modify the OS to get around some company policies set in place. One set of policies in particular deals with the Exchange device. Most companies require a pin or pass code as well as the ability to remotely wipe a device before allowing work email to be retrieved on the phone. While these can be useful security features, easy-to-access apps allow users to ignore both settings, getting emails on an Android device that will leave everything in the open if stolen.

Thankfully, the pain of this is getting easier with Android L. The new OS set to release later this year is introducing multiple profiles, a feature custom ROMs already have. This should allow users to have a separate, pin-locked work profile to access work email while their personal account is unlocked and readily available. The ease of switching between the two may lead to fewer users using third party work-arounds that block functionality.

Android is a great OS that can have locked down custom operating systems created for enterprise solutions, but unless that device is provided by the company a user has full control of their own phone. As a result, a bring your own device policy with Android devices that isn’t policed will be a security risk.

Next Steps:

Kaveh Nasouti
Systems Integration Engineer

Latest White Papers

2023 Global DevSecOps Report

2023 Global DevSecOps Report

Productivity and efficiency are top priorities for many organizations, as seen from the 2023 Global DevSecOps Report. It is no coincidence these two priorities are also the driving forces of DevOps. Explore how businesses utilized DevOps practices to achieve success...

Related Resources

Exploring the Powerful Features of Creo AAX for Complex Assemblies

Exploring the Powerful Features of Creo AAX for Complex Assemblies

Manufacturing can be an intricate and time-consuming process. It is important to utilize the proper software for successful execution, especially when working with complex assemblies. Complex assemblies typically have a high part count of diverse components and...