'Bring Your Own Network' Policy Tackles Rising Network Costs And Security In The Enterprise, iPass White Paper'Bring Your Own Network' Policy Tackles Rising Network Costs And Security In The Enterprise, iPass White Paper
Whitepaper outlines how CIOs and IT departments can boost mobile working practices effectively and tackle the rising security risks and costs of BYOD and BYON policies
November 28, 2012
REDWOOD SHORES, Calif., Nov. 27, 2012: iPass Inc. (NASDAQ: IPAS), the global Wi-Fi and enterprise mobility services leader, today announced the availability of a new white paper titled: "Why ‘Bring Your Own Device’ Needs ‘Bring Your Own Network’ to be Successful." The white paper illuminates how a BYON (Bring Your Own Network) strategy can effectively counteract rising network costs and security threats in addition to enabling a significant increase in mobile worker productivity outside of the office.
While many enterprises are rapidly embracing a more mobile workforce and supporting a BYOD strategy, a big unresolved problem for many is the cost of wireless network access. While devices are relatively cheap the wireless networks they run on are expensive. BYOD is all about allowing employees to choose and use their own mobile devices so they can access data and applications whenever they want and wherever they are, and BYON is about enterprises having policies in place to right-size the wireless access costs for employee tasks. Without a clear plan for purchase of wireless access, employees may make costly decisions (all in the name of "getting things done"), pushing connection costs into a budgetary black hole. Essentially, no BYOD plan is complete without a BYON companion.
“The escalation in productivity from mobile workers outside of the office has put more pressure on wireless networks, making them more complex to manage and making costs harder to control within an organization,” said Christophe Culine, senior vice president and general manager, iPass Enterprise. “With a ‘Bring Your Own Network’ approach, enterprises enable their mobile workers to access secure global Wi-Fi networks at a fraction of cellular data roaming costs. Mobile workers want to do what’s right for their companies and 55 percent of them report an additional 10 or more hours of work each week with smartphone, tablet and laptop access to cloud services outside of the office. Those additional work hours help the bottom line of companies that have a clear path to supporting mobile worker productivity.”
CIOs and IT now have choices for supporting different employee populations with clearly defined, differentiated policies for devices, access control and expense liability. These choices will enable IT to make BYOD—and BYON—successful for both employees and the enterprise.
For more information about iPass or to obtain a copy of the Bring Your Own Network white paper please visit: http://www.ipass.com/solutions/byon.
About iPass Inc. iPass helps enterprises and telecom service providers ensure their employees and subscribers stay well connected. Founded in 1996, iPass (NASDAQ: IPAS) delivers the world’s largest commercial-grade Wi-Fi network and trusted connectivity platform. With more than one million Wi-Fi hotspots across 113 countries and territories, iPass gives its customers always-on, frictionless connectivity for smartphones, tablets and laptops anywhere in the world – simply, securely and cost-effectively. Additional information is available at www.iPass.com or on Smarter Connections, the iPass blog.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
5 Reasons To Move your PKI Deployment to the Cloud