Click here to close now.


Microservices Expo Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan, Lori MacVittie

Related Topics: Containers Expo Blog, Mobile IoT, Microservices Expo, Agile Computing, Wearables, BlackBerry Developer

Containers Expo Blog: Article

Implementing BYOD Policies

Questions to consider

With the growing trends in mobilization and virtualization, the implementation of bring-your-own-device (BYOD) policies is increasingly popular among businesses around the globe. In a time when the majority of employees own a smartphone, laptop, or tablet, it makes sense that they should have the ability to conduct business using their personal devices. Realizing that these resources are already available, and most likely already in the hands of employees, businesses are making the shift towards BYOD workplaces. This practice improves employee satisfaction, while simultaneously growing business.

However, while the excitement surrounding BYOD grows, businesses must establish effective policies to prevent potential risks. In making the shift to BYOD environments, IT departments face many issues. For instance, how can data remain secure when employees are transporting their devices to and from work every day? How can one platform accommodate the increasing number of available devices and operating systems? How will the work experience change when employees are mobile?

While you're thinking about implementing a BYOD policy, here are a few questions to ask yourself:

Will a BYOD Policy Increase Security Risks?
Though the issue of security seems to top the list of concerns when it comes to BYOD policies, deterring employees from using their own devices can backfire. The truth is, if working from a personal device provides more convenience, employees will most likely break the rules when they are in a jam. Without a BYOD policy in place to educate staff on best practices, employees could be putting company information at risk unintentionally. For that reason, a carefully crafted BYOD policy is a plus for security purposes.

Will Employees Store Sensitive Data on Their Devices?
Companies can minimize the need for employees to store company information on smartphones and tablets by mobilizing core business applications. If employees can access business files and processes on-the-go as needed, it reduces the possibility that they will store data on personal devices.

How Can Business Applications Cater to Multiple Devices?
While mobilizing business applications increases overall productivity, it can end up creating more work for IT departments that are already overburdened. By leveraging a mobile enterprise application platform (MEAP), IT departments can mobilize an existing business application, deploy it across multiple devices and cater to the unique look and feel of the device from which the app is accessed. This eliminates the need for IT departments to individually program for each device.

How Can We Mobilize Legacy Apps?
Legacy systems are often the most essential applications for conducting business, but the platforms on which these systems run are generally expensive and obsolete. This can make mobilizing these applications difficult and time-consuming. To combat this, businesses can deploy an integration platform that allows legacy systems to easily connect with other services through automated actions and adjust as needed as new applications are added.

Will Mobility Change the Work Experience?
Yes, transitioning from desktop computers to mobile devices will change the work experience. The attention span of mobile users is a fraction of the attention span of desktop users, so IT professionals should keep this in mind when mobilizing business applications. Keep users productive and engaged with mobilized versions that aren't too complicated.

Will a BYOD Policy Save the Company Money?
With a shift toward BYOD, employees have the ability to complete their work from anywhere, at any time. This is especially true when companies provide access to mission-critical applications via mobile devices. This change in policy results in hours of work completed outside of the 9-to-5 workday.

How Can the Company Capitalize on Deploying Mobile Applications?
The concept of mobility is not just limited to the workplace and employees. Beyond the productivity benefits, mobility can also lead to new growth opportunities for businesses. For instance, the creation and deployment of branded apps leads to greater brand advocacy and, in some cases, creates a new revenue stream. A corporate app can prove extremely beneficial, especially if it's approached in a similar way to the mobilization of internal business apps. For example, make sure that the app can be easily deployed across multiple devices, provides an intuitive experience for consumers, and reinforces the corporation's messages and branding.

While BYOD seems to be an almost inevitable shift for businesses, the key is to ensure that the policies governing the switch to BYOD are effective. The purpose of implementing mobility in the workplace and the consumer market is to help the company grow, while simultaneously reinforcing its mission.

More Stories By Regev Yativ

Regev Yativ is President and CEO of Magic Software Enterprises Americas. He is responsible for the company’s business operations in the Americas (North America, Canada and Latin America), and is based in the U.S. Before this he served as Magic Software’s managing director in Europe and Japan, significantly growing those regions. Yativ holds a BA from Israel’s Tel Aviv University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@MicroservicesExpo Stories
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at, and Tomer Levy, co-founder and CEO of, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the archi...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
“All our customers are looking at the cloud ecosystem as an important part of their overall product strategy. Some see it evolve as a multi-cloud / hybrid cloud strategy, while others are embracing all forms of cloud offerings like PaaS, IaaS and SaaS in their solutions,” noted Suhas Joshi, Vice President – Technology, at Harbinger Group, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Application availability is not just the measure of “being up”. Many apps can claim that status. Technically they are running and responding to requests, but at a rate which users would certainly interpret as being down. That’s because excessive load times can (and will be) interpreted as “not available.” That’s why it’s important to view ensuring application availability as requiring attention to all its composite parts: scalability, performance, and security.
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and b...
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud wit...
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
At DevOps Summit NY there’s been a whole lot of talk about not just DevOps, but containers, IoT, and microservices. Sessions focused not just on the cultural shift needed to grow at scale with a DevOps approach, but also made sure to include the network ”plumbing” needed to ensure success as applications decompose into the microservice architectures enabling rapid growth and support for the Internet of (Every)Things.
For it to be SOA – let alone SOA done right – we need to pin down just what "SOA done wrong" might be. First-generation SOA with Web Services and ESBs, perhaps? But then there's second-generation, REST-based SOA. More lightweight and cloud-friendly, but many REST-based SOA practices predate the microservices wave. Today, microservices and containers go hand in hand – only the details of "container-oriented architecture" are largely on the drawing board – and are not likely to look much like S...
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Our guest on the podcast this week is Jason Bloomberg, President at Intellyx. When we build services we want them to be lightweight, stateless and scalable while doing one thing really well. In today's cloud world, we're revisiting what to takes to make a good service in the first place. Listen in to learn why following "the book" doesn't necessarily mean that you're solving key business problems.
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, ...