Article Index

In the last few years, technology and connectivity hav been making the line between personal and professional life more and more blur, like never before. Often this distinction is clear and precisely dictated by working days and hours, but more and more people, not just professionals, find themselves to do business activities (email, calls, documents, etc.) in places different from the office.

Working from home requires tools that allows to access the business’ resources while granting a minimum level of security and reliability. Cellphones, notebooks and tablets can connect to the networks in a secure way, send and receive emails, produce documents. It’s fundamental to always at hand devices that can access to the environment and to the resources of the company. In order to grant a minimum level of security, companies essentially have two approaches: allow the employee, or the partner, to use his own devices, or directly provide him them, as it used to happen in the past
The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to an tendency inversion. We talk about users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. A specific English term to describe this trend exists: “consumerization”, the closing gap between the professional and the consumer world.
Let’s try to analyze a few data: according to a survey of the Innovation Group made in 2013, out of 70 medium to big companies more than 80% allows, or is planning to adopt, a BYOD (Bring Your Own Device) policy; this option was previously limited to higher level employees, like managers and executives.
According to Gartner, BYOD and Cloud are the future of IT, it is therefore appropriate for companies and professionals to be prepared and understand the advantages and limits those solutions will offer in the near future.
The analysis on business mobility performed by VMware (june 2015) is interesting as well: on a record of 1000 companies all over the world, even though only 14% has already moved one or more business processes to the mobile model, a noteworthy 61% is going to adopt this policy in the short period. In the specific case of BYOD applied to the single employee the spread is even greater: 66% of the companies analyzed already ask their employees to utilize personal devices.


Pros and cons of BYOD

byod big

Let’s start by analyzing the pros, the advantages. The employee owns a device that has choosen according to personal preferences and needs. This approach consciously leads him to follow the business of the company outside of the working hours. The company only has to provide him with the security and the remote connection to the internal resources, while the costs related to ownership, hardware update and maintenance are at the expense of the worker, which is an evident advantage in economic terms. However, the list of the potential cons, the limits, is way wider. The first consideration is about multiplatform systems: because the device choice is not limited by policies of the company, mail services, VPNs and applications must be supplied for the greatest number of terminals possible. In the specific case of the mobile world, that means supporting to Google’s Android and Apple’s iOS is required. We can cite some solutions to that: for instance it’s possible to grant VPN connections with IPSEC and OpenVPN are compatible with both platforms.

  • Working from home requires tools that allows to access the business’ resources while granting a minimum level of security and reliability. Smartphones, notebooks and tablets can connect to the networks in a secure way, send and receive emails, produce documents.
  • 1

At this point it’s inevitable to deal with the considerable problem of connectivity. If on a company basis it’s easy, albeit expensive, to implement a complete wireless coverage of the working areas, the same is not true anymore when the communication mean becomes the Internet. In many areas of our country the residential connectivity is still ADSL based with speed in the order of tens of Mbps in download and less than 1 Mbps in upload. That’s a remarkable bottleneck. The mobile status is slightly better: the recent 3G and 4G solutions provide greater speeds. Speaking about numbers, in April 2015 only 22.3% of the italian population had access to ultrawide bandwidth (optical fibre with download speed equal or greater than 30Mbps), while 4G coverage varies from 33% of 3Italia to 88% of Vodafone (July 2015); in this case the mean download speed is in the order of 10-15Mbps with peaks of more than 40Mbps. Numbers and statistics tend to cite only download speeds, but in an off-premises productivity context the main limit is usually the upload speed of the user to the company. In this situation mobile solutions provide the best results, too.

Ministry of Economic Development
The provided data shows the situation in Italy in comparison with the rest of Europe
Ministry of Economic Development
Forecast of future development
Ministry of Economic Development
The projects on a mid-term basis
Ministry of Economic Development
The previsioned sum of money for the diffusion of broadband and ultra-broadband connections in the upcoming years

Once the problems regarding the user-company connection are sorted out, those regarding data security have to be faced. Safeguarding information is difficult even when they are kept inside the walls of the company, and saving documents, emails, contacts and sensible data on
personal devices exposes the company to even greater risks. Losing the devices and data leaks are the first to be considered, even the damage of the whole infrastructure of the company is possible in case of infected machine or used as Trojan horses.

Many of these risks already existed when the employees were using the company’s terminals, with the advent of BYOD the main difference is that the managements is left to the single user, it’s not the case anymore of computers and mobile devices prepared and controlled by the IT staff with dedicates Operative Systems and specific programs. Some solutions can be implemented to achieve the goal of security but leaving the owner to use the device as whatever he likes. The installation of a professional antivirus program is fundamental as much as the check of hardware and software properties of the new device must suit the requirements of the company (for instance, the OS version and an hardware adequate for the company applications). In addition to that, the installation of software apps for data protection, device block and even remote wipe in case of loss or theft must be considered.

About the Author

Lorenzo Bedin e Filippo Moriggia

Filippo Moriggia

After more than 10 years of experience in the technical journalism with PC Professionale (the italian version of PC Magazine) and other newspapers of Mondadori group, Filippo Moriggia founded GURU advisor, the reference website for IT professionals, system integrators, cloud providers and MSPs. He has a Master of Science in Telecommunications Engineering and works as a independent consultant and contractor for different firms. His main focuses are software, virtualization, servers, cloud, networking and security. He's certified VMware VCA for Data Center Virtualization.

Lorenzo Bedin

He graduated in Telecommunication Engineering and works as freelance IT consultant, after a period of training as systems analyst. Currently he provides hardware solutions, virtualized infrastructures and websites. Previous experiences in Web pubblications for Motociclismo.it

banner eng

fb icon evo twitter icon evo

Word of the Day

The term Edge Computing refers, when used in the cloud-based infrastructure sphere, the set of devices and technologies that allows...

>

The acronym SoC (System on Chip) describes particular integrated circuit that contain a whole system inside a single physical chip:...

>

The acronym PtP (Point-to-Point) indicates point-to-point radio links realized with wireless technologies. Differently, PtMP links connects a single source to...

>

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline...

>

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  •  GURU advisor: issue 21 - May 2019

    GURU advisor: issue 21 - May 2019

  • GURU advisor: issue 20 - December 2018

    GURU advisor: issue 20 - December 2018

  • GURU advisor: issue 19 - July 2018

    GURU advisor: issue 19 - July 2018

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1