{"id":5083,"date":"2013-08-13T16:14:15","date_gmt":"2013-08-13T20:14:15","guid":{"rendered":"http:\/\/southjerseytechies.net\/blog\/?p=5083"},"modified":"2015-06-03T13:15:19","modified_gmt":"2015-06-03T17:15:19","slug":"implementing-byod","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/","title":{"rendered":"Implementing BYOD"},"content":{"rendered":"<h2><a href=\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-5087\" src=\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\" alt=\"BYOD\" width=\"548\" height=\"240\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD-300x131.png 300w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD-250x109.png 250w\" sizes=\"auto, (max-width: 548px) 100vw, 548px\" \/><\/a><\/h2>\n<p><span style=\"color: #000000;\">Bring-Your-Own-Device (BYOD) is\u00a0permitting employees to bring personal devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access company information and applications.<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Create a Private App Store<\/span><\/h2>\n<p><span style=\"color: #000000;\">Designing a private App Store provides the ability to manage custom and purchased apps. \u00a0Businesses can manage apps by pushing mandatory apps, approving recommended apps and blocking rouge or unrelated apps.<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Policy Compliance<\/span><\/h2>\n<p><span style=\"color: #000000;\">Policies ensure security, productivity, protection of resources and reduce risks. \u00a0Implementing a location-based service (LBS) such as Geo-Fencing and GPS will set limitations on access to data based on location.<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Strong Security<\/span><\/h2>\n<p><span style=\"color: #000000;\">There are many layers of security for a BYOD environment. \u00a0Device enrollment can be a one-time passcode and\/or Active Directory credentials. \u00a0Applying user profiles will distribute policies, restrictions and Apps based on logical groups (department\/location\/device type). \u00a0Other types of security are tracking device locations, Remote Lock, Complete Wipe and Corporate Wipe.<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Track Usage<\/span><\/h2>\n<p><span style=\"color: #000000;\">Usage thresholds can be monitored based on talk, text, data and roaming for each user. \u00a0Setting up alerts and reports for misuse, excessive bandwidth, additional charges and security exposures will help track usage appropriately.\u00a0<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Banning Rouge Devices<\/span><\/h2>\n<p><span style=\"color: #000000;\">Compromised devices such as &#8220;jail broken&#8221; iPhone or a rooted Android should be restricted from accessing enterprise data and resources. \u00a0Compromised devices are susceptible\u00a0to virus attacks.<\/span><\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ff6600;\">For more information on Mobile Device Management<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #ff6600;\">Contact us at 856-745-9990 or <\/span><span style=\"color: #ff6600;\"><a title=\"SJT - MDM\" href=\"http:\/\/southjerseytechies.net\/mobile-device-management\/\"><span style=\"color: #ff6600;\">click here<\/span><\/a><\/span><span style=\"color: #ff6600;\">.<\/span><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bring-Your-Own-Device (BYOD) is\u00a0permitting employees to bring personal devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access company information and applications. Create a Private App Store Designing a private App Store provides the ability to &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[142,241,240,103],"tags":[203,156,842,604,1464,841,63],"class_list":["post-5083","post","type-post","status-publish","format-standard","hentry","category-security","category-smartphones","category-telecommunication","category-tips-info","tag-app","tag-data","tag-manage","tag-mobile-device-management","tag-security","tag-service","tag-south-jersey-techies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>South Jersey Techies - Implementing BYOD<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"South Jersey Techies - Implementing BYOD\" \/>\n<meta property=\"og:description\" content=\"Bring-Your-Own-Device (BYOD) is\u00a0permitting employees to bring personal devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access company information and applications. Create a Private App Store Designing a private App Store provides the ability to &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-13T20:14:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-03T17:15:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"175\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"Implementing BYOD\",\"datePublished\":\"2013-08-13T20:14:15+00:00\",\"dateModified\":\"2015-06-03T17:15:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\"},\"wordCount\":235,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\",\"keywords\":[\"App\",\"Data\",\"manage\",\"Mobile Device Management\",\"Security\",\"service\",\"South Jersey Techies\"],\"articleSection\":[\"Security\",\"Smartphones\",\"Telecommunication\",\"Tips &amp; Info\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\",\"name\":\"South Jersey Techies - Implementing BYOD\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\",\"datePublished\":\"2013-08-13T20:14:15+00:00\",\"dateModified\":\"2015-06-03T17:15:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage\",\"url\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\",\"contentUrl\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementing BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"South Jersey Techies - Implementing BYOD","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/","og_locale":"en_US","og_type":"article","og_title":"South Jersey Techies - Implementing BYOD","og_description":"Bring-Your-Own-Device (BYOD) is\u00a0permitting employees to bring personal devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access company information and applications. Create a Private App Store Designing a private App Store provides the ability to &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2013-08-13T20:14:15+00:00","article_modified_time":"2015-06-03T17:15:19+00:00","og_image":[{"width":400,"height":175,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png","type":"image\/png"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"Implementing BYOD","datePublished":"2013-08-13T20:14:15+00:00","dateModified":"2015-06-03T17:15:19+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/"},"wordCount":235,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage"},"thumbnailUrl":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png","keywords":["App","Data","manage","Mobile Device Management","Security","service","South Jersey Techies"],"articleSection":["Security","Smartphones","Telecommunication","Tips &amp; Info"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/","url":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/","name":"South Jersey Techies - Implementing BYOD","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage"},"thumbnailUrl":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png","datePublished":"2013-08-13T20:14:15+00:00","dateModified":"2015-06-03T17:15:19+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/implementing-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#primaryimage","url":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png","contentUrl":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2013\/08\/BYOD.png"},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/implementing-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Implementing BYOD"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-1jZ","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/5083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=5083"}],"version-history":[{"count":5,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/5083\/revisions"}],"predecessor-version":[{"id":7917,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/5083\/revisions\/7917"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=5083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=5083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=5083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}