Category Archives: BYOD

It’s a Holiday Miracle: Real Tips for a Highly Effective BYO Program

Yes, Virginia – there is such a thing as a successful enterprise BYO program and it doesn’t take a Christmas miracle to get it implemented! While virtually everyone in IT believes that a well-implemented BYO program can boost productivity and reduce costs, overcoming the twin obstacles of employee trust and data privacy have effectively slowed the overall implementation of these programs to the detriment of both parties—call it the coal in the Christmas stocking effect.

In fact, according to a study published in CIO magazine, over 70% of employees do not trust their corporate IT group to keep personal information private, even as 80% of employees use their personal devices for work related tasks. Talk about a holiday bummer!

A column written by Software Advice’s Taylor Short—who researches and writes buyer’s guides for help desk and IT professionals—provides keen insight into how Intel overcame significant trust and privacy issues to implement what, by all accounts, is a highly effective BYO program. According to Short’s interview with Intel’s IT Senior Principal Engineer, Alan Ross, the following three guiding principles have enabled them to overcome the trust gap and deliver a BYO program that employees love, and IT can live with.

  1. Establish trust by clarifying what the IT team can see on an employee’s device. Being very precise and clear about those areas that are strictly off-limits to IT eliminates ambiguity and helps to clarify boundaries, thereby preventing unpleasant surprises down the line.
  2. Create security tiers that allow employees to adhere to their preferred level of security monitoring and measures. Everyone has different comfort levels with surveillance, and those levels should correspond directly to the types of tasks and information access they can perform with their device of choice. Setting reasonable limits based on consistently applied policies helps create clarity and ensures that employees use the right device for the right task, without sacrificing their sense of privacy or corporate security.
  3. Establish data containers that separate work and personal data to reassure employees their private information will stay private. As the inventor of the centrally managed localized container, we at Moka5 believe this is absolutely central to a successful BYO implementation. Using containerized data and applications that are isolated from each other allows what belongs to IT to be managed by IT, and what belongs to the employee to managed by the employee.


Since we know that many of you will soon be unwrapping a fancy new tablet or smartphone, we want to make sure you can maximize its use at your workplace; and, that your IT department doesn’t have to play Scrooge again for another year!

A very happy holiday to all from your friends at Moka5.

Wired, Tech Target, and MSPToday Discuss the Challenges of Keeping Data Secure

With many still maintaining the assumption that if you manage and protect the physical computer, you’re managing and protecting the data, it should come as little surprise that trends like consumerization of IT and BYOD have made keeping data secure a hot topic in technology.

These recent articles form WIREDTech Target, and MSPToday discuss some of the concerns being faced by the enterprise while trying to keep data safe:

WIRED: Think Server-based VDI Keeps Your Data Secure? Think Again.

In a recent byline for WIRED Innovation Insights, Moka5 Founder and CTO, John Whaley discusses the security risks associated with deploying Virtual Desktop Infrastructure (VDI), the biggest of which being endpoint security. As John explains, “ While data applications reside in the data center, the endpoint itself can easily become a ‘front door’ into corporate systems.”

Tech Target: Six Ways Consumerization Leads to Data Leaks

As Matt Kosht explains in this article for Tech Target, “Consumerization has made employees more productive, but it has also created more risks for data leaks.” BYOD, app stores, and cloud storage are among the six ways consumerization leads to data leaks according to Kosht. There are however, ways to decrease these data leaks. For instance, although some cloud storage options tempt users to keep files in the cloud and access them from anywhere, “you can tightly manage documents with tools such as WatchDox and Moka5 for iOS. These products encrypt document and put rules around their use.”

MSPToday: When it Comes to BYO, Securing the End Device is a Losing Proposition for the Enterprise

As Moka5 Senior VP of Marketing, David Appelbaum explains in his interview with TMCnet contributing editor, Laura Stotler, “There will always be ways to thwart device security and device management. Don’t manage the device, assumer the device is corrupted.” Although Stotler considers it a bold approach, with the push towards BYO, she also considers “Moka5’s concept of protecting data and not individual devices…a sound one.”


Need a way to lock down and liberate your endpoint IT infrastructure? Learn more about how Moka5 can provide secure data storage, anywhere, any time, and on any device.