Oplon Secure Access is out.

ARTICLE BLOG

From BYOD to PYOD:
Protect Your Own Device

During the last 5 years we have seen an exponential increase of smart working and therefore practices bounded to it, such as BYOD (Bring Your Own Device). The acronym often brings up some controversy when brought up… Why?

With ‘BYOD’ we mean the usage of personal devices to access work applications and services, for example to manage resources, monitor online activity or execute maintenance on informatic systems and more.

This radical change brought the need of re-organizing the way we think about our jobs. From the employee point of view, work-life balance improved thanks to a more flexible way to manage day-to-day activities and the reduced commuting.

The employer instead, gains benefit from increased productivity (A study conducted by PwC in 2020 states that 52% of employers noticed an increase in productivity), because of a reduction in everyday office interruptions, leading to improved focus.

Although, what is the impact of using personal devices to work, on company assets and sensible data of every affiliated figure?

Law evolution on sensible data online

Personal devices, other than a way to carry out daily activities, are also a mean od self-expression. They are used to exercise one’s intimate curiosity, and this characteristic collides with some of the safety procedures aimed at protecting the business along with the individual accessing to its services. As a result, there were implemented legislations directed to regulate the working environment security to protect information.

Regulations and politics on privacy gain shape following their country cultural inclinations, the GDPR in Europe and the CCPA in California, to name a few.

Companies operating in those countries must follow the basic principles of the regulation, built on the following cardinal points: Informed consent, minimisation, separation, deletion, and safety of data.

Following these motives, technology had to adapt to regulation changes on the matter, developing solutions compliant to both the policies terms and the higher standard of protection against the latest generation of hacker attacks.

Protection systems evolved too, following basic needs such as encrypted connections to companies’ networks, means of secure and privileged access or monitoring connections in and out the used devices to notice, identify and promptly react to potential data violations.

The true challenge introduced by the new informatic paradigm though, is not carried out through only the accomplishment of compliances to policies and the protection of the company reputation, but first and foremost through the protection of the freedom of the most important company assets: The employee, in all his authenticity.

© Oplon Networks S.r.l. – All rights reserved

The challenge nobody talks about

These technologies should make jobs safer, but the landscape keeps getting confused between the sensations of ‘control’ felt by the employees toward their company, as to follow legal and moral regulations it tries to find the right balance between the consolidation of one’s safety and the safeguard of their freedom.

Regarding the practices of using a personal device to work, we need to consider that the employee digital life coexists in the same tool used to carry out company activities.

Private life and the freedom to exercise one’s own truthfulness are essential values that everybody should keep untouched. In many realities instead, people are forced to be analysed at every click, at every second of their working day, and in case of application installed on the PC, even more!

The psychological impact on people, when they feel sensations of deep scrutiny on their businesses, is not equivalent to the concept of ‘protection’…. But rather of ‘imprisonment’.The situation can only result in a drastic effect on every company asset, starting with the biggest and most important investment made by an organization: the employees.

This is not acceptable anymore, in a world evolving towards personal integrity and the dignity of being able to preserve one’s own unicity, values, thoughts and challenges.

The Solution

Oplon Secure Access finds a rather interesting meaning under the light of this matter, as the products usage is limited to the exclusive use of one of any browser window, restricting activity control and monitoring needed for security reasons to the window alone, without impacting in any way on the freedom of employees.

The elimination of downloads and agent installations, the complete separation of working activities from personal businesses and the complete monitoring of activity only and just on working environment, assure the total compliance to GDPR policies in an innovative, light and simple way for both the company and the employee, finally transforming a confused and unsecure practice such as BYOD, into PYOD: Protect Your Own Device.

Latest from the blog

VPN: The perfect solution or a loose cannon?

VPNs (Virtual Private Networks) are often hailed as essential tools for online security and anonymity, but are they really the perfect solution? In this article, we delve into the hidden risks and realities of VPN usage. From exposing corporate data to potential ransomware attacks, to the illusion of anonymity while browsing, the truth may surprise you. Discover the alternative technologies that can provide safer connections without the pitfalls of traditional VPNs. Join us as we explore the complexities of VPNs and what you need to know to protect your online presence effectively.

Read More →

Human Centered Design and Design Thinking for Oplon Secure Access

Human-Centered Design (HCD) and Design Thinking are pivotal in creating products that truly resonate with users. By placing the end user at the heart of the design process, we can uncover their needs and preferences, leading to innovative solutions. At Oplon Networks, we leverage these principles in developing Oplon Secure Access, ensuring a seamless and intuitive user experience. Discover how methodologies like User Personas, Root Cause Analysis, and the iterative process of Pretotyping and Prototyping can transform your approach to design and enhance usability in an increasingly digital world. Dive into our insights and elevate your design strategy!

Read More →

From BYOD to PYOD: Protect Your Own Device

BYOD in smart working poses security and privacy issues, making employees feel controlled, challenging the balance between compliance (GDPR) and personal freedom. The Oplon PYOD (Protect Your Own Device) solution overcomes this by ensuring security and separation between private and corporate life using only the browser, eliminating intrusive agents.

Read More →

VPN: The perfect solution or a loose cannon?

VPNs (Virtual Private Networks) are often hailed as essential tools for online security and anonymity, but are they really the perfect solution? In this article, we delve into the hidden risks and realities of VPN usage. From exposing corporate data to potential ransomware attacks, to the illusion of anonymity while browsing, the truth may surprise you. Discover the alternative technologies that can provide safer connections without the pitfalls of traditional VPNs. Join us as we explore the complexities of VPNs and what you need to know to protect your online presence effectively.

Read More →

Human Centered Design and Design Thinking for Oplon Secure Access

Human-Centered Design (HCD) and Design Thinking are pivotal in creating products that truly resonate with users. By placing the end user at the heart of the design process, we can uncover their needs and preferences, leading to innovative solutions. At Oplon Networks, we leverage these principles in developing Oplon Secure Access, ensuring a seamless and intuitive user experience. Discover how methodologies like User Personas, Root Cause Analysis, and the iterative process of Pretotyping and Prototyping can transform your approach to design and enhance usability in an increasingly digital world. Dive into our insights and elevate your design strategy!

Read More →
.st0 { fill: #ec6b4f; }

Request a demo

Fill out the form to be contacted by one of our operators.