BYOD and New Network Requirements

Adopting BYOD increases the bandwidth usage, deteriorating the performance of other devices and applications in the network. This becomes definitely a pain instead of the expected advantage.

According to BT and Cisco’s research, the companies implementing BYOD practices should reinforce their networks, their security and obtain complete control of all the devices in them whether they are mobiles or not, to accomplish their planned productivity.

According to research based in 2,200 surveys to executives and companies in 13 countries along the different regions, the growth of mobiles devices is exponential and has increased the bandwidth usage in 84%. Actually, 56% of IT managers have detected a lower performance in the network and certain applications as a result of the increased bandwidth consumption. This impacts the devices’ maintenance processes and updates as well.

These negative effects are perceived by the employees; 46% of the employees with Wi-Fi access have detected delays in connecting to the network, in the applications deployment and performance, and in their devices updating, briefing, their systems whether mobiles or not have become slower in every mean. 76% of the professionals that responded to the survey think that companies should take the needed measures to increase the productivity, security, and performance. From the surveyed TI professionals, 33% suggested working with more applications based in Cloud, 32% suggested using specialized software, and 32% suggested increasing support to mobile devices users.



This is clearly one of the most common pains produced by the innovative mobile revolution. Now read this:

Even though having a Wi-Fi access is fundamental to a BYOD development, 45% of the employees do not have Wi-Fi access to their corporate networks. Of this number 68% thinks that having this access would turn into a positive impact on their work, 30% said it would increase their flexibility at work, and 26% said it would ease their contact within the company.

Network capacity is definitely not the only challenge to consider when adopting BYOD. Actually, 84% of the surveyed IT professionals said that BYOD could be a competitive advantage only if the necessary processes, tools, and policies are adopted; 26% think that employees understand the requirements to get the access and permissions for their mobile devices.

RMM and MDM are definitely one of these requirements; a properly applied continuous RMM/MDM policy allows the IT professionals to control the installation, deployment and performance of each application and device whether it is BYOD or not. RMM/MDM tolls also control the corporate information security and access in the network help

ing it to improve its performance. Additionally, the regular RMM/MDM processes reinforce security policies along the network, devices and corporate information.

Gordon Thompson, EMEA Enterprise Network Director in Cisco, stated that they already have a BYOD model. They started in 2009 only with smart phones, achieving savings of 25% on cost-per-employee. They recently added 82% more devices to their base increasing the number of users by28%. He added that companies intending to implement BYOD definitely have to consider a BYOD comprehensive plan beyond the operating system; they have to consider the device support and maintenance, , the end user experience and the increased productivity.

John Timko, Marketing Director at LabTech Software, explained that RMM/MDM services, IT networks and application performance work hand-in-hand. RMM certainly improves the network and devices’ performance.

Timko added that in a nutshell, the appropriate RMM and MDM services together with high performing network hardware and software can deliver any IT support and management task or process that needs to be accomplished remotely, efficiently and non-intrusively, giving the support and performance needed to achieve the desired productivity, and end-user experience and at the same time reinforcing security and information availability.

The smart phones and tablets trend is to continue growing, and companies need to develop BYOD plans, so they imminently need a cost-effective RMM and of course MDM solution. The market is there, opened and in need, waiting for experienced RMM and MDM services and solutions provider to help them achieve their performance goals.

Monica Paul, Marcomtec Group


BYOD is definitely a pain but also an advantage to companies; an advantage because at first sight it represents huge savings since they don’t have to invest or spend?... in smartphones for their executives and employees. However, the security gaps become real threats.

The owned smartphone use for work purposes continues to expand, and the governance, risk and compliance implications of the trend are beginning to take the companies attention. According to a recent survey by Search basic_security_iconCompliance, "security risk" was cited by 96% of respondents as being among their top concerns regarding BYOD (bring your own device) initiatives in their organizations.

"Compliance" was the second-ranked top BYOD concern in the survey, taken by 773 IT professionals during SearchCompliance's April 24 virtual conference, The State of Cyber Security 2013.

All these new mobile technologies are changing the way business is done -- often in positive ways. 41% of the survey responders stated that these technologies ‘make workers more productive’. However CIOs also consider that these small mobile devices with vast capabilities force them to re-engineer the business processes and implement security and management tools to offset mobile device security risks.

It professionals work is not to say 'no,' -- their job is to explain the senior leaders the risks and the rewards of bringing this technology into the organization, and to provide the correct tools to have the network, processes, and corporate information safe.

“BYOD in today’s world is very popular however the amount of personal mobile devices linked to corporate systems provide a security nightmare for any IT admin. The MDM plugin in LabTech offers advanced control over iPhone and android which allow you to remotely wipe/destroy the data on the device should it become lost/stolen.” Explained  Matt Towell, Network Administrator, DataFortress & LabTech Technical Engineer at Blue Solutions.

There are compelling arguments for mobile technology use in the workplace, but the IT leaders need to have discussions with the C-suite about these mobile device security controls. Of course they need to include RMM and BYOD projects as an integrated part of the regular security and network management and optimization budgets.

IT Professionals have to have their eyes wide open and say, 'Look, if we are using these new mobile technologies, we need to have the controls and tools to manage them and secure them as well as our information and network.

Yes BYOD is a pain but also a benefit, the pain may be healed with the adequate RMM tool, then the benefits may increase exponentially, same as the savings and the IT staff time optimization.

Monica Paul, Marcomtec Group