Skip to main content

Bringing Order to the Chaos of BYOD

When it was the de-facto business standard, BlackBerrys provided two great benefits. First, they provided new communication capabilities that transformed the way professionals work. But for the IT team, they did something even better: providing a standardized platform with great management tools. Say what you will about the BES server, you could instantly reach out and admin any device, anywhere. Its major shortcoming wasn’t that RIM failed to innovate, (though that didn’t help), it was that it was expensive and effectively an IT tax on every connected employee.

It was a brilliant product strategy that generated revenue for RIM in a way no other BYOD (Bring Your Own Device) solution has managed to duplicate. Initially, a couple of geeks in IT, or more often Ops, got RIM devices which were then noticed by a techie senior exec. That then drove executive adoption, and for that you wanted a BES. Once the BES was in place, then you were a single solution organization - RIM. Every new user bought hardware and a BES seat. Budget managers were forced to accept it.

Rewind to 2008 when a few techie, often marketing people, started showing up with iPhone3s. They were connected enough with a friendly IT admin to get WiFi access. Techie execs saw them and said they wanted them too and “best of all”, said the first adopter, “you don’t need a BES server and I’ll pay for my own device”. Once the budget tsar got wind of that, BlackBerry was done. Unfortunately, so were the days of easy device administration.

Apple and Microsoft saw an opportunity and quickly worked together to make the iOS/Exchange Active Sync at least marginally useful to IT, allowing the budget office to counter the IT manageability argument. IT relented and opened some Guest SSIDs.

As with any shiny new technology that changes the world in a rush, this has produced a growing problem for IT managers. Few organizations believe they have an adequate BYOD management plan and it’s further compounded by the ever-increasing MDM (Mobile Device Management) problem that had already been an issue for some time.

In fact, in a recent SolarWinds-Network World Survey over 65% of IT organizations don’t feel confident that they have an adequate mobile device strategy in place.

Network and Systems admins work together as best they can to manage roving nodes, but most tools and techniques are limited to access control and bandwidth optimization. Even assuming you get those under control, there is still a long list of other concerns, from how many devices will actually show up, to ever changing app traffic mix, network and application security risks and even potential HR issues from content accessed on the company provided guest-network. So then, what can IT do today, to bring order to the chaos?

1. Get a handle on what’s connecting where with user device tracking software. It’s a switch port mapper for the mobile age.

2. Use your current system’s network monitoring and traffic analyzer to make sure the BYOD secondary SSID/subnet isn’t hogging the bandwidth for notebooks and other corporate mobile devices .

3. Determine how various users and departments are using mobile devices today and what they want to do in the future. Make sure usage is compatible with your organization's security policies.

BYOD has a bright future and there’s no question as techies, heck, as people, we prefer to select our own mobile device. For many of us it’s the single object we interact with more than anything else during the day. With a little planning and use of existing monitoring and management technologies, organizations can resolve many of their issues with BYOD. Who knows, one day we might even see a few BlackBerry Z10s playing nice on the same infrastructure as iOS and Androids.

ABOUT Patrick Hubbard

Patrick Hubbard is a Senior Technical Product Marketing Manager and Head Geek at SolarWinds. He joined SolarWinds in 2007 and combines 20 years of technical expertise with IT customer perspective to create geeky content that speaks to fellow networking and systems professionals. Hubbard’s previous roles have included product management and strategy, technical evangelism, sales engineering and software development in Austin high-tech and Fortune 500 companies.

Hot Topics

The Latest

Developers building AI applications are not just looking for fault patterns after deployment; they must detect issues quickly during development and have the ability to prevent issues after going live. Unfortunately, traditional observability tools can no longer meet the needs of AI-driven enterprise application development. AI-powered detection and auto-remediation tools designed to keep pace with rapid development are now emerging to proactively manage performance and prevent downtime ...

Every few years, the cybersecurity industry adopts a new buzzword. "Zero Trust" has endured longer than most — and for good reason. Its promise is simple: trust nothing by default, verify everything continuously. Yet many organizations still hesitate to implement Zero Trust Network Access (ZTNA). The problem isn't that ZTNA doesn't work. It's that it's often misunderstood ...

For many retail brands, peak season is the annual stress test of their digital infrastructure. It's also when often technical dashboards glow green, yet customer feedback, digital experience frustration, and conversion trends tell a different story entirely. Over the past several years, we've seen the same pattern across retail, financial services, travel, and media: internal application performance metrics fail to capture the true experience of users connecting over local broadband, mobile carriers, and congested networks using multiple devices across geographies ...

PostgreSQL promises greater flexibility, performance, and cost savings compared to proprietary alternatives. But successfully deploying it isn't always straightforward, and there are some hidden traps along the way that even seasoned IT leaders can stumble into. In this blog, I'll highlight five of the most common pitfalls with PostgreSQL deployment and offer guidance on how to avoid them, along with the best path forward ...

The rise of hybrid cloud environments, the explosion of IoT devices, the proliferation of remote work, and advanced cyber threats have created a monitoring challenge that traditional approaches simply cannot meet. IT teams find themselves drowning in a sea of data, struggling to identify critical threats amidst a deluge of alerts, and often reacting to incidents long after they've begun. This is where AI and ML are leveraged ...

Three practices, chaos testing, incident retrospectives, and AIOps-driven monitoring, are transforming platform teams from reactive responders into proactive builders of resilient, self-healing systems. The evolution is not just technical; it's cultural. The modern platform engineer isn't just maintaining infrastructure. They're product owners designing for reliability, observability, and continuous improvement ...

Getting applications into the hands of those who need them quickly and securely has long been the goal of a branch of IT often referred to as End User Computing (EUC). Over recent years, the way applications (and data) have been delivered to these "users" has changed noticeably. Organizations have many more choices available to them now, and there will be more to come ... But how did we get here? Where are we going? Is this all too complicated? ...

On November 18, a single database permission change inside Cloudflare set off a chain of failures that rippled across the Internet. Traffic stalled. Authentication broke. Workers KV returned waves of 5xx errors as systems fell in and out of sync. For nearly three hours, one of the most resilient networks on the planet struggled under the weight of a change no one expected to matter ... Cloudflare recovered quickly, but the deeper lesson reaches far beyond this incident ...

Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space ...

Every modern industry is confronting the same challenge: human reaction time is no longer fast enough for real-time decision environments. Across sectors, from financial services to manufacturing to cybersecurity and beyond, the stakes mirror those of autonomous vehicles — systems operating in complex, high-risk environments where milliseconds matter ...

Bringing Order to the Chaos of BYOD

When it was the de-facto business standard, BlackBerrys provided two great benefits. First, they provided new communication capabilities that transformed the way professionals work. But for the IT team, they did something even better: providing a standardized platform with great management tools. Say what you will about the BES server, you could instantly reach out and admin any device, anywhere. Its major shortcoming wasn’t that RIM failed to innovate, (though that didn’t help), it was that it was expensive and effectively an IT tax on every connected employee.

It was a brilliant product strategy that generated revenue for RIM in a way no other BYOD (Bring Your Own Device) solution has managed to duplicate. Initially, a couple of geeks in IT, or more often Ops, got RIM devices which were then noticed by a techie senior exec. That then drove executive adoption, and for that you wanted a BES. Once the BES was in place, then you were a single solution organization - RIM. Every new user bought hardware and a BES seat. Budget managers were forced to accept it.

Rewind to 2008 when a few techie, often marketing people, started showing up with iPhone3s. They were connected enough with a friendly IT admin to get WiFi access. Techie execs saw them and said they wanted them too and “best of all”, said the first adopter, “you don’t need a BES server and I’ll pay for my own device”. Once the budget tsar got wind of that, BlackBerry was done. Unfortunately, so were the days of easy device administration.

Apple and Microsoft saw an opportunity and quickly worked together to make the iOS/Exchange Active Sync at least marginally useful to IT, allowing the budget office to counter the IT manageability argument. IT relented and opened some Guest SSIDs.

As with any shiny new technology that changes the world in a rush, this has produced a growing problem for IT managers. Few organizations believe they have an adequate BYOD management plan and it’s further compounded by the ever-increasing MDM (Mobile Device Management) problem that had already been an issue for some time.

In fact, in a recent SolarWinds-Network World Survey over 65% of IT organizations don’t feel confident that they have an adequate mobile device strategy in place.

Network and Systems admins work together as best they can to manage roving nodes, but most tools and techniques are limited to access control and bandwidth optimization. Even assuming you get those under control, there is still a long list of other concerns, from how many devices will actually show up, to ever changing app traffic mix, network and application security risks and even potential HR issues from content accessed on the company provided guest-network. So then, what can IT do today, to bring order to the chaos?

1. Get a handle on what’s connecting where with user device tracking software. It’s a switch port mapper for the mobile age.

2. Use your current system’s network monitoring and traffic analyzer to make sure the BYOD secondary SSID/subnet isn’t hogging the bandwidth for notebooks and other corporate mobile devices .

3. Determine how various users and departments are using mobile devices today and what they want to do in the future. Make sure usage is compatible with your organization's security policies.

BYOD has a bright future and there’s no question as techies, heck, as people, we prefer to select our own mobile device. For many of us it’s the single object we interact with more than anything else during the day. With a little planning and use of existing monitoring and management technologies, organizations can resolve many of their issues with BYOD. Who knows, one day we might even see a few BlackBerry Z10s playing nice on the same infrastructure as iOS and Androids.

ABOUT Patrick Hubbard

Patrick Hubbard is a Senior Technical Product Marketing Manager and Head Geek at SolarWinds. He joined SolarWinds in 2007 and combines 20 years of technical expertise with IT customer perspective to create geeky content that speaks to fellow networking and systems professionals. Hubbard’s previous roles have included product management and strategy, technical evangelism, sales engineering and software development in Austin high-tech and Fortune 500 companies.

Hot Topics

The Latest

Developers building AI applications are not just looking for fault patterns after deployment; they must detect issues quickly during development and have the ability to prevent issues after going live. Unfortunately, traditional observability tools can no longer meet the needs of AI-driven enterprise application development. AI-powered detection and auto-remediation tools designed to keep pace with rapid development are now emerging to proactively manage performance and prevent downtime ...

Every few years, the cybersecurity industry adopts a new buzzword. "Zero Trust" has endured longer than most — and for good reason. Its promise is simple: trust nothing by default, verify everything continuously. Yet many organizations still hesitate to implement Zero Trust Network Access (ZTNA). The problem isn't that ZTNA doesn't work. It's that it's often misunderstood ...

For many retail brands, peak season is the annual stress test of their digital infrastructure. It's also when often technical dashboards glow green, yet customer feedback, digital experience frustration, and conversion trends tell a different story entirely. Over the past several years, we've seen the same pattern across retail, financial services, travel, and media: internal application performance metrics fail to capture the true experience of users connecting over local broadband, mobile carriers, and congested networks using multiple devices across geographies ...

PostgreSQL promises greater flexibility, performance, and cost savings compared to proprietary alternatives. But successfully deploying it isn't always straightforward, and there are some hidden traps along the way that even seasoned IT leaders can stumble into. In this blog, I'll highlight five of the most common pitfalls with PostgreSQL deployment and offer guidance on how to avoid them, along with the best path forward ...

The rise of hybrid cloud environments, the explosion of IoT devices, the proliferation of remote work, and advanced cyber threats have created a monitoring challenge that traditional approaches simply cannot meet. IT teams find themselves drowning in a sea of data, struggling to identify critical threats amidst a deluge of alerts, and often reacting to incidents long after they've begun. This is where AI and ML are leveraged ...

Three practices, chaos testing, incident retrospectives, and AIOps-driven monitoring, are transforming platform teams from reactive responders into proactive builders of resilient, self-healing systems. The evolution is not just technical; it's cultural. The modern platform engineer isn't just maintaining infrastructure. They're product owners designing for reliability, observability, and continuous improvement ...

Getting applications into the hands of those who need them quickly and securely has long been the goal of a branch of IT often referred to as End User Computing (EUC). Over recent years, the way applications (and data) have been delivered to these "users" has changed noticeably. Organizations have many more choices available to them now, and there will be more to come ... But how did we get here? Where are we going? Is this all too complicated? ...

On November 18, a single database permission change inside Cloudflare set off a chain of failures that rippled across the Internet. Traffic stalled. Authentication broke. Workers KV returned waves of 5xx errors as systems fell in and out of sync. For nearly three hours, one of the most resilient networks on the planet struggled under the weight of a change no one expected to matter ... Cloudflare recovered quickly, but the deeper lesson reaches far beyond this incident ...

Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space ...

Every modern industry is confronting the same challenge: human reaction time is no longer fast enough for real-time decision environments. Across sectors, from financial services to manufacturing to cybersecurity and beyond, the stakes mirror those of autonomous vehicles — systems operating in complex, high-risk environments where milliseconds matter ...