Jamf Blog
No room for secrets in a successful BYOD program

No room for secrets in a successful BYOD program

The Deccan Chronicle discusses the importance of transparency in BYOD programs.  

In a recently published article, Deploying BYOD: Raising concerns for Global Users’ Privacy Rights, Murli Mohan, General Manager at Dell Software, discussed the importance of transparency and respect for employee privacy when implementing BYOD policies.

“While developing a BYOD policy to enforce security in an organization, it is important to be transparent with one’s employees about their responsibilities as dictated by the BYOD policy.”

With the Casper Suite BYOD solution, we ensure that IT can be 100 percent transparent with users regarding what they can and cannot do during enrollment and anytime thereafter. We have also used Apple’s MDM feature set to ensure that an iOS device enrolled as a personal device gets a restricted MDM payload to prevent IT from accessing or wiping personal data. This ensures that IT can feel confident in their ability to secure personally owned iOS and Android devices and users can feel confident that their privacy is maintained.

As Mr. Mohan wrote, “Companies need to employ BYOD in a way that technically assures protection of their data when it is accessed by a personal device. Most importantly, while doing all this, organizations need to ensure that they remain cost efficient as well.”

By leveraging per-app VPN and ‘managed open in’ to secure the enterprise app ecosystem, the Casper Suite BYOD solution can be used to deploy managed apps to iOS devices that adhere to strong security standards. The Casper Suite also leverages remote wipe/lock capabilities and encryption to protect against risk and maintain security compliance.

Check out this enterprise brief to learn how the Casper Suite makes BYOD programs a success by making them more transparent. 

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.