StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Integrated system design for cloud enterprise network and a secure BYOD - Essay Example

Cite this document
Summary
The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Integrated system design for cloud enterprise network and a secure BYOD
Read Text Preview

Extract of sample "Integrated system design for cloud enterprise network and a secure BYOD"

BYOD By + Definition of Key Words for BYOD Mobile Technology Consumerization of IT as a trend has improved with the introduction of modern mobile devices. The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own mobile devices like smart phones and tablets. Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their location (Hayes & Kotwica, 2013, 19).

Cloud enterprise network A cloud enterprise network is a network that leverages cloud services for an organization to enable organizations to store and transfer information through a closed network. Cloud enterprise networks only require the organization to have an internet connection and either wired or wireless private physical infrastructure (such as computers and mobile devices). A cloud enterprise network allows employees to access files, applications and printers from any location and on any device.

Bring Your Own DeviceBYOD is a phrase that has gained wide adoption in reference to employees who bring their personal devices to work in order to use them for connectivity and use on the company’s secure corporate network. Employees use their own smartphones, PDAs, laptops and tablets for use at the workplace. Surveys indicate that allowing employees to use their personal devices to access the organization’s private information and applications contributes to an increase in convenience and productivity of employees (Hayes & Kotwica, 2013, 26).

Integrated Computing System An integrated computing system is a system involving an organization combining component subsystems with software applications both functionally and physically to function in coordination. Organizations use the integrated computing system together with their cloud network in BYOD to store information as well as transfer files in a secure way. Unauthorized persons are restricted from accessing organizations’ integrated computing systems through different measures.

SecuritySecurity of the organization’s network is an important factor to consider in the implementation of BYOD (Hayes & Kotwica, 2013, 28). Despite the fact that using personal devices for BYOD causing security concerns, many organizations that have adopted BYOD implement a security policy for their networks to assist their respective Information Technology teams to quell such concerns. Organizations have implemented several measures to boost their BYOD security. Such policies are such as Mobile device management, application virtualization and containerization.

Conclusion With the advent of mobile technology, organizations have widely adopted BYOD within their systems as a method to boost both productivity and morale of their employees, according to surveys. However, it is imperative for organizations to implement relative measures to ensure that the entire computer system on which the organizations run to protect both the hardware and software from access by unauthorized persons. Companies need to address the threats brought by BYOD in its IT strategy and formulate better ways of securing the cloud network even from the mobile devices’ end.

Organizations should also include a BYOD policy in employee contracts to ensure inclusivity in efforts to protect the BYOD, the cloud system and the entire integrated computer network.BibliographyHayes, B. and Kotwica, K. (2013). Bring your own device (BYOD) to work. 1st ed. Oxford: Elsevier.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Integrated system design for cloud enterprise network and a secure Essay”, n.d.)
Integrated system design for cloud enterprise network and a secure Essay. Retrieved from https://studentshare.org/information-technology/1659167-integrated-system-design-for-cloud-enterprise-network-and-a-secure-byod
(Integrated System Design for Cloud Enterprise Network and a Secure Essay)
Integrated System Design for Cloud Enterprise Network and a Secure Essay. https://studentshare.org/information-technology/1659167-integrated-system-design-for-cloud-enterprise-network-and-a-secure-byod.
“Integrated System Design for Cloud Enterprise Network and a Secure Essay”, n.d. https://studentshare.org/information-technology/1659167-integrated-system-design-for-cloud-enterprise-network-and-a-secure-byod.
  • Cited: 0 times

CHECK THESE SAMPLES OF Integrated system design for cloud enterprise network and a secure BYOD

Integrated Enterprise System

There are various benefits that are associated with the implementation of ERP system by a business, which include improved network management, enhanced resource sharing, improved data accessibility and reduced infrastructural costs (Ray, 2011 p544).... Table of Contents Clear budgeting and goal setting 6 Constituting a good team 6 Change management 7 Business process re-engineering 8 ERP implementation models 8 Workflow model 8 Partial implementation model 10 Why some companies tend to successfully implement ERP while others experience failure 11 Inadequate training 11 Corporate culture 12 Inadequate planning, budgeting and unrealistic expectations 12 The benefits of deploying ERP systems 13 Improved data accessibility 13 Saving on infrastructure costs 13 Resource sharing 14 Improved network management 14 Conclusion 14 Appendix 15 References 17 Introduction Information is the fundamental resource for any successful business, considering that it is through the access and use of the available information regarding the product, the customers' needs, markets, the suppliers and the competitors, that a business is able to strategize its operations, so that the operations will suit into the existing business environment, and thus allow the business to thrive and overcome the challenges posed by the business environment, as well as the competitive forces....
13 Pages (3250 words) Essay

Wireless network implementation (Enterprise Network Design (Aston))

The current network design analysis showed us that there are strong areas of the network and many weak areas.... Aston has recently reached the limits of its network.... As a result, this network upgrade will help Aston to grow and stay on top for many years to come.... One problem with the current network is the reliability.... QoS will also be implemented in all layers of the network to improve performance....
9 Pages (2250 words) Case Study

The Contribution of Operations Management

We need therefore to widen the definition of opertions mngement to second level: The design, opertion nd improvement of the internl nd externl systems, resources nd technologies tht crete... This might be clled mnufcturing deprtment, n opertions system, or hve no identifible nme t ll....
15 Pages (3750 words) Essay

Strategic Issues and Options Facing an Organization

Apple's culture, capacity to innovate and approach to strategic human resource management and… The key strategic issue that can be noted is Apple's strategy for maintaining a proprietary, integrated system of the hardware and software that is in contrast with the technology that is adapted by most of the Strategic investments that are made by the companies are indicative of the strategic direction and intentions....
10 Pages (2500 words) Essay

Advanced Management and Design in Yotsuba Group

The report proposes that the company adopts a wired and wireless type of network system infrastructure.... hellip; The author states that the greatest concern with the implementation of a wireless network is the security that will need to be implemented when installing an enterprise wireless LAN.... Before the implementation of this type of network, this report acknowledges the fact that there are two types of networks that will be implemented in this setting....
10 Pages (2500 words) Assignment

Enterprise Resource Planning as a Modular Integrated Systems Strategy

The paper "enterprise Resource Planning as a Modular Integrated Systems Strategy" states that once one section of the new system is in place and functioning properly, the old section of the same is removed and a new phase is begun.... iven that there are several types of modular design methods, only six of them are considered as standard.... hellip; It is clear to see that ERP systems offer a wide range of benefits to the implementer of the system....
8 Pages (2000 words) Case Study

The Effect of Cloud Computing on Enterprise Networks

for cloud systems to work efficiently, an organization has to link their data center resources to the cloud resources in order to allow for data access (Rittinghouse, & Ransome, 2009).... This has a major toll on the organization's network, however, how those effects the network is dependent on three essential factors.... This presents the company with the challenge of either having to store their data in the cloud or access a highly efficient network with a sizable QoS to enhance the cloud connections....
7 Pages (1750 words) Literature review

Network Enterprise Architecture

… The paper "network Enterprise Architecture" is a wonderful example of an assignment on architecture.... nbsp; The paper "network Enterprise Architecture" is a wonderful example of an assignment on architecture.... Before acquisition GT Nexus was considered the world's largest cloud-based platform.... SAP is serving several modules; most important ones include field service, marketing and sales, utilities for marketing, product development and design, inventory control and production, finance and accounting and human resources....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us