Simplifying BYOD Deployment: Five Tactics Organisations Should Employ

Share Article

Exinda cuts through BYOD confusion with lessons learned over the last 12 months

If one thing is certain around BYOD, it is that there are still many questions to be answered as organisations charge forward in the face of significant complexity and confusion. However, according to Exinda, there are important tactics network managers can employ to take advantage of BYOD.

Exinda is a leading global supplier of WAN Optimization and Network Control solutions, with more than 2,500 customers spanning industries such as manufacturing, retail, government and education. The following are the five tactics organisations should employ today to be prepared for and/or optimize BYOD in the most efficient way:

1.    Segment users and monitor access devices
Users today connect to corporate networks using multiple devices simultaneously, but with an unknown impact on the network. The first step for organisations is to refocus tracking of user activity and bring online tools, currently integrated with the corporate directory, to provide visibility of network activity by user, therefore incorporating each device the user connects with.

2.    Build a BYOA policy to go with BYOD
While many organisations have a device policy in place, few have implemented well-constructed application policies which dictate the user productivity and social applications that can be used on the network and which, more importantly, will be supported by IT. The challenge for network managers is to define which personal applications will be supported, which should be controlled, and which should be prohibited altogether.

3.    Publish a detailed BYOD expense policy
A critical step on the path to profitable BYOD adoption is a well-defined cost model and expense policy. Pragmatic network managers and CIOs should build a cost model that goes beyond device and device support costs to include application, management and usage costs.

4.    Perform a BYOD network readiness assessment
Many organisations are pushing forward with BYOD without first assessing the network’s ability to support it. This includes the fundamental network infrastructure and bandwidth as well as expertise on the IT team, support process readiness and management tool effectiveness in a BYOD environment.

5.    Remodel the application SLAs for BYOD
As a network manager, the proof of success is the network application SLA. Above all else, the network’s ability to deliver a reliable, predictable user experience for critical applications regardless of time, network and device is the key to success or failure.

A full examination of the five BYOD tactics organisations can use today is available in the Exinda white paper: “5 Things You Can Do Today to Control BYOD”.

“As much as we may feel suffocated by BYOD analysis and discussion, two things are certain as we move through 2013,” said Brendan Reid, VP Product Marketing at Exinda. “Firstly, BYOD is here to stay, and secondly, if organisations are to adopt BYOD successfully and profitably, a number of vital steps, like those mentioned here, must be taken to ensure a full, cost-effective deployment”.


About Exinda
Exinda is a leading global supplier of WAN optimization and Network Control solutions. Exinda enables organizations to assure a predictable user experience for strategic business applications through policy-based WAN optimization and Network Control that intelligently allocate network bandwidth and optimize traffic based on the priorities of the business. The company has helped more than 2,500 organizations in over 80 countries worldwide assure application performance, improve the end-user experience, contain recreational applications and reduce network operating costs for the IT executive. For more information, please visit

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Andy Parker/David Mclean
Visit website