• Madhavi Dhingra



BYOD, BYOD Security, Device Security, Security Issues, Bring Your Own Device


BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. A powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.



Download data is not yet available.


AirWatch. (2012). Enabling bring your own devices (BYOD) in the enterprise. Retrieved from Google Scholar

AlHarthy, K., Shawkat, W. (2013, November-December). Implement network security control solution in BYOD environment. IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia. Google Scholar, Crossref DOI:

Armando, A., Costa, G., Merlo, A. (2013, March). Bring your own device, securely. Proceedings of the 28th annual ACM Symposium on Applied Computing, Coimbra, Portugal. Google Scholar, Crossref DOI:

Ballagas, R., Rohs, M., Sheridan, J. G., Borchers, J. (2013). BYOD: Bring your own device. Retrieved from Google Scholar

Björn, N., Sebastian, K., Kevin, O., Stefan, K. (2012). Towards an IT consumerization theory: A theory and practice review. Working papers, ERCIS – European research center for information systems, no 13. Retrieved Febuary 10, 2014 from Google Scholar

Chung, S., Chung, S., Escrig, T., Bai, Y., Endicott-Popovsky, B. (2012, December). 2TAC: Distributed access control architecture for “bring your own device” security. ASE/IEEE International Conference on Biomedical Computing, Washington, DC. Google Scholar, Crossref DOI:

Cisco. (2012). BYOD: A global perspective (Survey report). Retrieved from Google Scholar

Citrix®. (2013, April). Best practices to make BYOD simple and secure (White paper). Retrieved from Google Scholar

Citrix®. (2012, March). Bring your own devices (Solution brief). Retrieved from Google Scholar




How to Cite

Dhingra, M. . (2018). BYOD SECURITY AND ITS POSSIBLE SOLUTIONS. International Journal of Engineering Technologies and Management Research, 5(2), 101–106.