Le concept Bring Your Own Device: en quoi bouleverse-t-il la gestion du voyage d’affaires ? Ceci denote d’une evolution significative des politiques IT au sein des entreprises, impactant de ce fait la gestion des voyages. Il est impossible d’echapper au phenomene de ‘consumerization’ : les employes souhaitent retrouver au travail la meme qualite d’outils que dans leur quotidien.
A ce jour, 42% des smartphones et 38% des ordinateurs portables utilises dans le cadre professionnel appartiennent en realite aux salaries a titre prive. Le BYOD presente des valeurs ajoutees significatives, notamment au niveau Ressources Humaines, dans la mesure ou cette pratique favorise la productivite des collaborateurs et reflete une bonne image de l’entreprise. Cependant, le BYOD represente un defi financier lie a la securite et a la protection des donnees. La generation Y a donne le ton en plebiscitant largement le multi-canal, mais aussi avec son appetence pour les sites a l’ergonomie conviviale.
Aujourd’hui, entre 20 et 50% des reservations d’hotel sont faites en dehors du canal preferentiel de l’entreprise. Les editeurs de solutions technologiques proposent desormais aux entreprises des solutions leur permettant de gerer ces nouveaux comportements de reservation. KDS propose le concept ‘door-to-door’, un systeme intelligent de reservation de voyages qui organise l’integralite du deplacement, de porte-a-porte et aller-retour. Dans le cadre d’une flexibilite accrue donnee aux collaborateurs, la problematique du respect du budget alloue au voyage se pose. La gestion des deplacements professionnels est fortement influencee par la technologie et les nouveaux comportements de reservation.
En parallele, les systemes de reservation des deplacements professionnels evoluent, placant le voyageur au centre des preoccupations en proposant de nouvelles approches plus en phase avec ses besoins.
Nous sommes definitivement entres dans une nouvelle ere de solutions technologiques de gestion du voyage d’affaires.
Objectif reduction des couts de distribution : la desintermediation et le Direct Connect sont-ils la reponse ? Bonjour, En effet, les nouvelles technologies sont des nouveaux enjeux pour le monde de demain. As a result of the consumerization of the enterprise, employees are bringing their own mobile devices to the workplace in organizations everywhere. Filtering of Corporate Data Only: MECS allows for a Split VPN configuration in which will pass only corporate traffic over corporate network. Winn Schwartau, noted and published Cyber Security Expert discusses and outlines the BYOD conundrum, that just about every private, government and military organization is asking itself today about the consumerization of IT by mobile devices of myriad flavors. Los Angeles County Office of Education selects Mobile Active Defense to secure its 1:1 mobile ecosystem system.
On 12-13 November 2013, Lemberg’s MD visited Enterprise Mobility: BYOD  co-located at Dexter House along with Telecoms API conference. In a session “How will mobility transform the business and why?” Alex Batlin, Group CTO - Applied Innovation, UBS, suggested to treat an employee as a customer, when creating apps for corporate use.
His approach was to forget the marketing noise with numerous acronyms that do not mean anything to user, and instead to ask just one big question: “What does success look like?”. He promoted use of mind games bouncing questions like “what if?” - “so what?”, “Experiment and failure” approach (iterative burst of funded and time boxed experimentation followed by production projects backed by business cases), business model canvas. He thoughtfully analyzed users, contexts and strategies for successful BYOD implementation. Antonis Patrikios, director of a legal company Field Fisher Waterhouse LLP, and Dr Simon Rice, Principal Policy Advisor - Technology, ICO discussed legal and regulatory considerations of BYOD.
To summarize, BYOD trend is a significant change and a consequence of modern lifestyle, when employees are at the same time consumers who are used to having (often more than one) mobile device personally.
Lemberg is a mobile and web development company with strong client base in the UK, Europe, and the USA. Starting from 2007, Lemberg has been helping leading design and marketing agencies, start-ups, innovative businesses deliver brilliant digital solutions for a number of the world’s biggest brands. Bring Your Own Device (BYOD) is becoming increasingly popular in the corporate environment, with many organisations looking to save money and resources, while allowing employees to use devices they are familiar with. Recent reports from research giants Gartner suggest that bring your own device, as well as bring your own application, are the future in ways that employees consume services and data for their roles. Bring your own device consists of an organisation allowing an employee to use their own device to access the corporate network remotely, either from their home location or from the workplace. However, with all these benefits there are a large number of bring your own device security risks that need to be considered.

Bring your own device is a trend that is rising, with 82% of organisations allowing some form of BYOD in 2013.
The organisation may wish to secure the device partially by initiating dual boot on the device. By doing this, the organisation can ensure that the operating system is locked down and secure. Bring our own device security risks may also be minimized by implementing mobile device management software. Bring your own device security risks are clear, however, they are also partially manageable. Lee Hazell is a cyber security consultant with a keen interest in anything tech or security related. Enter your email address here to receive daily cyber security news feeds direct to your inbox! Enter your email address here to receive daily cyber security newsfeeds direct to your inbox!
Les nouvelles pratiques comme le Bring Your Own Device (BYOD) y contribuent largement, bouleversant par la meme occasion la gestion du voyage d’affaires au sein des entreprises. Cette pratique est largement favorisee par le Cloud, adopte par la grande majorite des entreprises, qui permet d’acceder a son Systeme d’Information via Internet. Les DSI, tout comme les acheteurs et les fournisseurs de technologie en sont des acteurs majeurs.
Leurs comportements d’achat evoluent, tout comme leurs attentes, si bien qu’ils tendent a devenir partie prenante dans le choix des outils utilises dans leur entreprise. Tout comme a l’echelle globale, 70% des salaries travailleront depuis leurs propres terminaux en 2018 (source : GBTA France).
Si l’entreprise realise des gains sur la maintenance et l’achat d’infrastructures, l’apport de son propre materiel, impliquant egalement la multiplicite des appareils, a apporte de la complexite et devient synonyme de couts supplementaires en matiere de securisation. Ceci est favorise par le fait que les collaborateurs utilisent leur propre materiel dans un cadre professionnel.
Les collaborateurs peuvent ainsi lier leurs profil Concur et reserver sur leur site de predilection, tout en beneficiant des tarifs negocies par leur entreprise et des eventuels programmes de fidelite le cas echeant. Ceci fera l’objet d’un prochain post sur la ‘gamification’, qui consiste dans le voyage d’affaires a valoriser les comportements vertueux des collaborateurs qui reservent conformement a la politique budgetaire de leur entreprise… A suivre ! Nos articles traitent des enjeux strategiques dans le secteur du tourisme au travers de themes tels que les tendances marketing dans l’e-tourisme, les evolutions technologiques liees au voyage, les etudes de cas concrets afin d’illustrer l’impact de ces evolutions sur les acteurs de la chaine du voyage. The BYOD conundrum however, may be a mis-phrasing as it may not be an “either or” binary question. My fellow security executives need to take this threat seriously and do something about it – sooner than later.
Bring Your Own Device is an enterprise policy (or philosophy) towards use of personal devices at work.
John walker, CTO, Ascot Barclay Group Ltd, looked at security flops or oversights that make BYOD a disaster.
A user will only use the proposed applications if they are genuinely useful, make his life easier, and look and feel as polished as any other apps he can use for personal purposes: “People want solutions to their problems, needs and desires, not someone else’s.
He did not fail to mention that new technology itself can paradigm shift the art of the possible to fulfill or solve previously un-met needs, desires and problems. Antonis Patrikios stressed that the core legal challenge is the balance between data security and employee privacy. However, BYOD brings with it a number of risks, and this article will look at Bring Your Own Device security risks and recommendations in further detail. The paper outlined by Gartner suggests that by 2017 half of all employers will utilise bring your own device to reduce costs and increase usability in the work place. The benefits are clear – by allowing employees to use their own machines, the organisation can save money on procuring and managing that equipment. As the device is owned by the employee, it is also used for their own personal use and the organisation has no control over this. This means that the organisation would struggle to control the device from a technical perspective, for example, applying anti virus signatures or preventing the user from accessing malicious websites when browsing the Internet.
As the organisation will allow the user to bring any device, this leaves a multitude of different technologies, operating systems and applications to attempt to manage. As the organisation has no control over what is being executed by the user, there are clear risks from both malicious applications as well as applications that utilise mass amounts of bandwidth, reducing the capability of the network.
This will allow the organisation to ensure that if the user is accessing the corporate network from the device that they are doing so from a secure, clean operating system.

The organisation can also implement controls to ensure that the employee can only access the corporate network from a secured VPN in the clean operating system. This will enable the organisation to centrally apply security policies, lock down devices and utilise secure wipe remotely. Security risks will still remain, however, the organisation must consider utilising controls outlined here to reduce the risk to an acceptable level. La plateforme Airbnb notamment, initialement dediee aux voyageurs loisirs, enregistre aujourd’hui plus de 20% de reservations dans le cadre de deplacements professionnels (source : GBTA France). Le collaborateur se voit proposer des itineraires complets de porte-a-porte, directement reservables et ajustables, et indique egalement une prevision de depenses (taxi, restauration…).
This paper will functionally’ taxonimize’ the security spectrum of BYOD and options available to enterprises today.
And, external trends and events do influence and alter social behavior forcing a choice on an individual to either adapt or stay as before. He expressed opinion that by entering BYOD programme voluntarily, users should grant consent to company examining their devices in case of breach-of-security suspicion. In most cases, the only option businesses have is to accept (with varying degree of success) the inevitable, rather than fight it, which might prove too costly both in financial and human terms. The same paper also states that by 2015, employees utilising mobile applications for work purposes will double – this presents a whole lot of bring your own device security risks in the immediate future. It also brings benefits in allowing employees to use devices they are familiar with, as well as reducing the number of devices employee’s have to carry out if the on the move, for example.
With this in mind, the organisation cannot apply any controls to the device to reduce the likelihood of the device being infected with malware or compromised. With this lack of control, the organisation places itself at risk from a potentially compromised device extracting data from the corporate network when connecting remotely. This presents further bring your own device security risks and complications that organisations seriously need to consider when deciding whether or not to allow bring your devices. These multitude of bring your own device security risks are partially manageable, however, it is strongly recommended that in a sensitive environment BYOD is not used as the organisation can never truly control the device and secure it from compromise. This operating system can be configured onto the device via partitioning the device and installing the operating system on a separate cluster. The organisation should be aware, however, that this approach will not secure the device entirely. Permission may need to be gained from the employee to allow this type of software but this will allow a central control of devices. Bring your own device is a trend that will continue for years to come and, while organisations are embracing this, they must also consider the risks to the rest of their network. Une maniere de donner de la flexibilite au collaborateur tout en facilitant le processus de reservation. During 2 days of the  BYOD conference more than 20 mobile visionaries from enterprises such as VMware, Aviva, Vodafone, BUPA, UBS discussed various facets of BYOD policy in their companies, shared success and failure stories from corporate world. He reiterated known fact that the law is lagging behind in digital and BYOD matters, however, all BYOD-related procedures and actions should still comply with the law.
However, properly implementing BYOD policy poses a lot of challenges - security, legal, organisational, is not a trivial task and requires all-round approach involving legal, HR, IT departments.
If the users personal device does become infected or compromised, the attacker can use this as a platform to attack the corporate network, extract company data from the users device or allow the malware to propagate onto the corporate network. The next section looks at bring your own device security recommendations, to reduce the risks of BYOD. Many strains of malware can attach to the boot process or compromise resources that are utilised by both operating systems.
Dr Simon Rice proudly announced new ICO guidance published 7 March 2013 which is intended for data controllers and outlines a number of key risks. Dual boot may be a viable option for some organisations, however, this should be part of a risk assessed process.
He mentioned poll results that confirm 47% of UK adults use their personal devices for work (in all probability this number is even higher), but only 30% are provided with a guidance.

Cloud benefits for small business
Neat cloud faq anarquista
Cloud 9 chamillionaire free download juegos


  1. 08.12.2015 at 15:25:22

    Such as a word processor, spreadsheet justCloud offers full-service cloud.

    Author: Raufxacmazli
  2. 08.12.2015 at 21:25:48

    Again I don't want to pay for you wabt to upload there.

    Author: BAPOH
  3. 08.12.2015 at 21:43:41

    Available with both Verizon FiOS?® Internet and.

    Author: JUSTICE