Integrated system design for cloud enterprise network and a secure BYOD - Essay Example

Comments (0) Cite this document
The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Integrated system design for cloud enterprise network and a secure BYOD
Read TextPreview

Extract of sample "Integrated system design for cloud enterprise network and a secure BYOD"

BYOD By + Definition of Key Words for BYOD Mobile Technology Consumerization of IT as a trend has improved with the introduction of modern mobile devices. The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own mobile devices like smart phones and tablets. Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their location (Hayes & Kotwica, 2013, 19).
Cloud enterprise network
A cloud enterprise network is a network that leverages cloud services for an organization to enable organizations to store and transfer information through a closed network. Cloud enterprise networks only require the organization to have an internet connection and either wired or wireless private physical infrastructure (such as computers and mobile devices). A cloud enterprise network allows employees to access files, applications and printers from any location and on any device.
Bring Your Own Device
BYOD is a phrase that has gained wide adoption in reference to employees who bring their personal devices to work in order to use them for connectivity and use on the company’s secure corporate network. Employees use their own smartphones, PDAs, laptops and tablets for use at the workplace. Surveys indicate that allowing employees to use their personal devices to access the organization’s private information and applications contributes to an increase in convenience and productivity of employees (Hayes & Kotwica, 2013, 26).
Integrated Computing System
An integrated computing system is a system involving an organization combining component subsystems with software applications both functionally and physically to function in coordination. Organizations use the integrated computing system together with their cloud network in BYOD to store information as well as transfer files in a secure way. Unauthorized persons are restricted from accessing organizations’ integrated computing systems through different measures.
Security of the organization’s network is an important factor to consider in the implementation of BYOD (Hayes & Kotwica, 2013, 28). Despite the fact that using personal devices for BYOD causing security concerns, many organizations that have adopted BYOD implement a security policy for their networks to assist their respective Information Technology teams to quell such concerns. Organizations have implemented several measures to boost their BYOD security. Such policies are such as Mobile device management, application virtualization and containerization.
With the advent of mobile technology, organizations have widely adopted BYOD within their systems as a method to boost both productivity and morale of their employees, according to surveys. However, it is imperative for organizations to implement relative measures to ensure that the entire computer system on which the organizations run to protect both the hardware and software from access by unauthorized persons. Companies need to address the threats brought by BYOD in its IT strategy and formulate better ways of securing the cloud network even from the mobile devices’ end. Organizations should also include a BYOD policy in employee contracts to ensure inclusivity in efforts to protect the BYOD, the cloud system and the entire integrated computer network.
Hayes, B. and Kotwica, K. (2013). Bring your own device (BYOD) to work. 1st ed. Oxford: Elsevier. Read More
Cite this document
  • APA
  • MLA
(“Integrated system design for cloud enterprise network and a secure Essay”, n.d.)
Integrated system design for cloud enterprise network and a secure Essay. Retrieved from
(Integrated System Design for Cloud Enterprise Network and a Secure Essay)
Integrated System Design for Cloud Enterprise Network and a Secure Essay.
“Integrated System Design for Cloud Enterprise Network and a Secure Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Integrated system design for cloud enterprise network and a secure BYOD

Cloud Network Management

...request for that do not exist. 2.2.4 Survey Results The results will influence the project direction. It will affect the game type to implement. It will provide a strategy for income generation of game. That is, whether from direct sales or through advertisement. Advertisement is the best option as it relies on the presence of a large number of users that are present in cloud networks Summary of market surveys Market survey method Effect Internet surveys Highly effective Questionnaire distribution Moderately effective Section 3: Project Planning 3.1 Design Blueprints The blueprints of this project will focus on the key principles in game development. These are system...
10 Pages(2500 words)Literature review

Integrated Enterprise System

...? Integrated Enterprise System/ Enterprise Resource Planning (ERP) systems Grade (14th, April. Integrated Enterprise System Executive Summary The discussion draws attention to the concept of Enterprise Resource Planning (ERP), its benefits, the models applicable in its implementation and the critical success factors for ERP implementation. Further, the discussion investigates why some companies may succeed in the implementation of the ERP system, while others fail in the same. ERP is an information management system that is applied by businesses to...
13 Pages(3250 words)Essay

Management (How Secure is the Cloud )

...? Management Chapter 8: How Secure is the Cloud (30 points) Certainly, there were several trouble, technology, and organization factors responsible for the McAfees Software line of work. As concerning the management factors, the management failed to run the test simulations fort Windows XP after the completion of the simulation tests. The same case applied to the Operating System with reference to service pack 3. Thus, most of the users that were at the time using Windows XP3 and the version8.7 of the virus scan suffered the wrath of update download that was defective. When it comes to the organization factors, a major concern was the lack of efficiency in the McAfee's staff. Although the...
1 Pages(250 words)Essay

Network Design the internet; including remote connection to the engineering department through the ATM. The design will use IPSec Virtual Private Network to create connections between different sites and the subsidiaries of SHFL in Vienna. The available options for accounting executives include: IP Sec Virtual Private Network Secure Socket Layer The cost of all equipment required is about US $500000. Core Switch This will act as the access point to the internet or to the WAN. It will link through servers, and will be able to connect switches to collect the workstations of the network and other items. It is the center to the LAN networks in SHFL,...
4 Pages(1000 words)Essay

Network system , Cloud Networking

...?Cloud Networking Evaluation of Cloud Networking Design, Security and Architecture Infrastructure. Miss Ranna Almoussa 1128267 Computer Science and Technology University of Bedfordshire Luton, UK, 2013-14 Email: Abstract: The adoption of cloud computing concept into IT networking is nothing but ‘Cloud Networking’. This service builds up cooperative transmission, communication and cloud data accessing through cloud networking. Cloud Networking reduces...
7 Pages(1750 words)Essay

Wireless network implementation (Enterprise Network Design (Aston))

...we build. In order to overcome this constraint we will have to provide the technicians with training on security and the systems being integrated. New Network Design Analysis The new network will strengthen all areas of the network and replace all old technologies with the latest and greatest. The campus backbone in the new network will consist of layer 3 switches connected with wireless LAN. This will eliminate the bottlenecks we currently experience at peak traffic times. Extended from the campus backbone, the edge distribution, building distribution and server farm will all have new, fully...
9 Pages(2250 words)Case Study

Secure Computer System

...Secure Component System 1. ify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether or not business continuity plans would be called into play. a. A hacker gets into the network and deletes files from a server. - occurrence is an incident. b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained. - occurrence is a disaster. c. A tornado hits a local power company, and the company will be without power for three to five days. - occurrence is a disaster. d. Employees go on strike, and the company could be without critical...
3 Pages(750 words)Essay

Integrated Service Digital Network

... Integrated Service Digital Network Frame Relay This is a telecommunication service, which is designed for cost- effective transmission of data. This data transmission is for alternating traffic amid local area networks (LAN) and amid endpoints in a Wide Area Network (WAN). It puts data in a changeable-size unit named a frame. Then it leaves some essential error rectification (data retransmission) to the endpoints that accelerate overall transmission of data (Dean, 2010). Integrated Service Digital Network (ISDN) This is an original internet service of high-speed. It sparked the development of high-speed internet amid...
1 Pages(250 words)Assignment

Enterprise infrastructure and Cloud

...should choose IaaS out of the three available platforms. I am recommending that TRU should choose Infrastructure as a service (IaaS) of the hybrid cloud computing type. Cloud computing Cloud computing is a distributed computing system that makes information technology services available on remote computers. Internet based service providers offer cloud computing. Some of the services offered include data storage, processing, applications, and software. Organizations using cloud services can improve their efficiency and can also respond quickly to customers’ demands. Challenges facing cloud computing There are some...
3 Pages(750 words)Essay

Network Virtualization in Cloud

...operations. Further dissection within the networks include options such as De militarization Zone (D-M-Z) which ensures protecting and dissecting the overall network for the purpose of reduced system damages and reduced chances of system breach. Various security measures such as Iaas also allows protecting against the migration threat and other associated features and damages that are possibly and likely to take place in the virtual networks (Franceschetti and Grossi, p. 78). Cloud computer is also based on the feature of being compatible with the different software platforms and operating system units....
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Integrated system design for cloud enterprise network and a secure BYOD for FREE!

Contact Us