Skip to main content
Nov 26, 2013

Should Enterprises Worry About WYOD (Wear Your Own Device)?

wyod_wear_your_own_deviceMobile is beginning to take on a whole new meaning. Until recently, “mobile” technologies were neatly categorized. They typically referred either to smartphones, tablets, or other types of portable devices (scanners,  ruggedized laptops, etc.). However, the emergence of wearable and embedded mobile computers -- a trend known as WYOD (Wear Your Own Device) -- is prompting an expanded definition of what’s viewed as “mobile.” We’re seeing the development of wearable technologies ranging from Google Glass, in which the wearer of a head-mounted optical device is able to view information in a smartphone-like hands-free format and request information using natural language commands to the use of embedded body chips and bracelets for personal identification and transactions.  But it doesn't stop there. Some people are beginning to don wearable devices such as Samsung Galaxy Gear smart-watches that can be used to take calls when driving, capture video images, and listen to music when paired with an external Bluetooth speaker. Meanwhile, smart GPS-enabled shoes are now available that can guide the wearer to their destination via LED lights. While corporate IT professionals shouldn't worry too much about having to support an employee’s smart shoes, the recent eruption of wearable technologies does carry enterprise network security implications. As these devices become increasingly more sophisticated and are integrated with traditional mobile devices such as smartphones and tablets, corporate apps and data could become vulnerable to hackers, malware, and other security threats. As such, IT and security administrators will need to adjust their organization’s bring your own device (BYOD) policies to ensure that corporate data is being protected while making sure that malware that could be picked up by wearable devices doesn't infect corporate data or apps. We have yet to see if employees end up wearing smart-watches, Bluetooth necklaces, or other forms of wearable technologies for work. However, IT professionals that focus on corporate data and apps will be better positioned to monitor, inspect, and review enterprise mobile apps that are being used on a wearable device.

Apperian

More from the Blog
May 27, 2020

Application Security: Testing is NOT Enough

In the software development world, developers are faced with a breakneck release schedule and tasked to produce applications ...
Read more
Apr 30, 2020

Mobile Application Management: A Forward View

IT Is Adapting in the Midst of the COVID-19 Pandemic The Coronavirus pandemic is a human tragedy, affecting hundreds of thou ...
Read more
Apr 16, 2020

The Next Step in the Arxan Journey

As many of you may have seen, we just announced that w
Read more