Lisa Durant, a research analyst at Nemertes Research, says information technology companies that adopt bring-your-own-device programs should develop policies for the applications, content, users and their devices to protect the organization from data leaks.
Durant wrote in a piece published Monday on AT&T‘s Networking Exchange Blog that administrators should cover these factors in their approach to help facilitate user flexibility and information security.
The program’s user coverage, users’ level of access and authorized device users beyond employees should be included in policies for user groups and mobile devices, Durant says.
She adds that IT leaders should also choose between mobile device management and mobile application management programs based on what works best for the company’s needs.
MAM includes application security measures such as application wrapping, secure container and virtual desktop infrastructure.
Finally, Durant notes that administrators also need to consider the different types of devices and their respective functions for content when they develop acceptable-use policies.