Wednesday, September 25, 2019
Integrated system design for cloud enterprise network and a secure Essay
Integrated system design for cloud enterprise network and a secure BYOD - Essay Example A cloud enterprise network is a network that leverages cloud services for an organization to enable organizations to store and transfer information through a closed network. Cloud enterprise networks only require the organization to have an internet connection and either wired or wireless private physical infrastructure (such as computers and mobile devices). A cloud enterprise network allows employees to access files, applications and printers from any location and on any device. BYOD is a phrase that has gained wide adoption in reference to employees who bring their personal devices to work in order to use them for connectivity and use on the companyââ¬â¢s secure corporate network. Employees use their own smartphones, PDAs, laptops and tablets for use at the workplace. Surveys indicate that allowing employees to use their personal devices to access the organizationââ¬â¢s private information and applications contributes to an increase in convenience and productivity of employees (Hayes & Kotwica, 2013, 26). An integrated computing system is a system involving an organization combining component subsystems with software applications both functionally and physically to function in coordination. Organizations use the integrated computing system together with their cloud network in BYOD to store information as well as transfer files in a secure way. Unauthorized persons are restricted from accessing organizationsââ¬â¢ integrated computing systems through different measures. Security of the organizationââ¬â¢s network is an important factor to consider in the implementation of BYOD (Hayes & Kotwica, 2013, 28). Despite the fact that using personal devices for BYOD causing security concerns, many organizations that have adopted BYOD implement a security policy for their networks to assist their respective Information Technology teams to quell such concerns. Organizations have implemented several measures to boost their BYOD security. Such
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment