• Login
  • Create an Estimate

3 BYOD Implementation Mistakes and Pitfalls to Avoid

Written by Danny Mareco Danny Mareco | November 19, 2013

The demand for BYOD is increasing and organizations are being faced with increasing pressure to allow BYOD. BYOD is a big decision and is does take time and planning for successful integration. Too often, organizations are making mistakes that can be detrimental to BYOD success. Check out some of the common ones below.


Sign up for a Free BYOD Readiness consultation here

  • Having the Ability to only track the device not the user: Make sure to have online tools available such as monitoring and reporting of users so tracking can be made on the user rather than just the device.  If you have BYOD policy users are probably connecting to the network with multiple devices. To fully understand the extent of all the users and devices attaching to your network you must be able to recognize the user (which should be integrated with your corporate directory.) When you are viewing network activity by user you can build policies around the user and devices and take better control of the impact they will have on your networks bandwidth and security.  Knowing only the devices on the network will not allow you to build the same policies and could quickly become unmanageable.BYOD solution


  • Implementation without a defined policy: Make sure to build well defined policies around the applications that you will allow the user to access on the network.  Know early on what applications you want to support, what applications you want to support but control access to and what applications you want to ban altogether.  Once defined, communicate those to your users.  Rate limiting and banning certain applications can save much needed bandwidth and application support costs so building a defined policy is a MUST for allowance of users’ own devices. 


  • Beginning the rollout without the proper network in place:  How many networks take on the proliferation of users’ own devices without being able to adequately handle the load?  Too many.  Make sure you have a centralized management of control, meaning all of your wireless security, configuration, and settings are in one place and can be pushed to your remote WLAN’s.  Make sure to have a scalable network in place as well.  With the proper real-time monitoring you should know when and if you need to begin scaling forward and ease of use, when needed, is key. 

Recent surveys reveal 90% of companies will be offering BYOD by 2014. Also, 64% of users are said to be accessing their corporate network with their own devices now.  Be ready with the proper security and policies in place to handle this massive trend and avoid the four above mistakes, because BYOD is coming whether you like it or not.

If your organization is considering implementing a BYOD solution, contact us here for a free BYOD readiness consultation. We have helped organizations all over the country with their BYOD implementation process. We can help you make sure you avoid the possible pitfalls and detrimental mistakes such as these. Our goal is to be a resource for you.

BYOD, byod network design, byod implementation, wireless service providers,

Related Posts

See all posts