Lock Down Devices without Crippling Functionality: CIO and Gartner Talk BYO, VDI, and Moka5

It’s not a new question, but with more and more corporations adopting or evaluating BYO policies, it’s one that’s asked frequently: How can IT gain visibility and control of these devices in order to mitigate security risks, without crippling their functionality or becoming ‘Big Brother’? If you are looking for professional help then I suggest you contact the great team over at Charles Brian International.

From mobile security to VDI, these recent articles by CIO, BankInfoSecurity.com, and the Gartner blog take a look at the obstacles and steps involved in managing mobile devices, especially those personal devices doing double-duty.

CIO covered Dell Software’s announcement of a new suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.

As editor Ellen Messmer explains, “Dell’s thinking on Bring Your Own Device (BYOD) includes PCs and Macs, not just smartphones and tablets, because enterprise often sees business partners bringing them in as a part of work. It’s ‘Bring Your Own PC,’ [Dell Software’s director of mobility solutions, Roger] Bjork says. Dell is offering a way to create a controlled corporate image for this, and Dell’s mobility offering will provide that help from partner Moka5.”

In an interview with BankInfoSecurity.com, Moka5’s Ian McWilton discusses how to improve security and user satisfaction, but not by managing the device as one might assume. As McWilton explains, “mobile security is no longer about managing devices… the real trick is to secure corporate assets through containerization solutions that reduce costs and improve user experience.”

In a year-end wrap-up blog, Gunner Berger discussed how converged platforms have simplified the deployment and management of VDI. Berger goes on to explain that, “VDI isn’t ‘fixed’ it’s just gotten to a point of maturity where it’s not nearly as difficult to understand and deploy it.” Does this mean that offline virtual desktops—like Moka5—are more likely to be used as a solution for BYO and mobile management in 2014? Only time will tell.

Yes, BYO raises a lot of questions. However, when it comes to the question of controlling and gaining visibility into BYO devices, without crippling their functionality or invading employee privacy, the answer is actually similar than you might think. Learn more about Moka5 as a solution BYOD and test-drive Moka5 today.

Will CYOD Replace BYOD

If you’ve been following the conversation surrounding BYOD, you’ve likely been seeing a lot of mentions of CYOD lately. No, this isn’t someone mistyping one of the tech industries’ most talked about tech terms; it’s a reference to “choose your own device.”

What is CYOD and Where Did it Come From?

A few months ago, IDC made a bold prediction as part of their Asia-Pacific forecast for 2014: “BYOD as an enterprise mobile strategy is dead.”

With BYOD lying in a ditch somewhere, IDC expects a new trend to emerge: “Eligible users will be given a choice of device that they can use for work, also referred to as ‘Choose Your Own Device (CYOD) model. Organization evaluating mobility strategically will look to CYOD as the main adoption model where management and security can be standardized and guaranteed, and business processes can be mobilized.”

Although the idea of “choose your own device” nothing new—Adam Bender of ComputerWorld was writing about CYOD vs. BYOD back in March of last year—it is certainly poised to be big in 2014. But does CYOD really mark the end of BYOD, or just the next step in the continued challenge of the demand for device flexibility in the workplace? To make that call, you first need to understand the differences, and similarities, between CYOD and BYOD.

What Sets CYOD and BYOD Apart?

BYOD, or bring your own device, can be defined as the policy of permitting employees to bring personally owned devices into the workplace or access corporate information or applications using those devices. BYOD isn’t limited to mobile, in fact, BYO-PC, or bring your own personal computer, continues to be an increasingly discussed topic in tech as the lines between computers and tablets continue to blur.

Unlike BYOD, which encourages end-users to work off of a personally owned device, choose-your-own-device (CYOD) addresses consumerization of the enterprise by offering employees the choice of approved devices. CYOD strategies mean more control for IT, while still giving employees the flexibility to use the device of their preference.

However, flexibility of devices isn’t the only thing that BYOD and CYOD have in common. As with COPE (corporately owned, personally enabled), BYOD and CYOD both challenge IT to determine a strategy for managing data across a variety of devices.

BYOD and CYOD also share a common issue of keeping corporate and personal separate. Although by definition, you might expect CYOD to be reserved for corporate use, thus keeping company and personal data separate. However, just as employees choose BYOD because it allows them to use one device for everything, employees seeking to use one device will likely use their “chosen” device for personal projects, as well as company projects. And who could blame them? Imagine you’re working from home on your chosen company device—a Macbook Air—would you power it down to use your ’06 Dell to check Facebook? Likely not.


Where do you think BYOD and CYOD are headed in 2014? Leave us a comment and let us know.

Moka5 is Enterprise Anyware

Empower your workforce. Stay secure. Cut the strings. Moka5 is Enterprise AnyWare.

Enterprise AnyWare for the Everywhere Enterprise

Today, all computing is mobile computing. The majority of computing devices—from notebooks to tablets to smartphones—are designed to bring MIPS to where and when they’re needed to perform critical business functions. But as these devices continue to evolve, it becomes increasingly difficult—and expensive – for IT organizations to support them all. Moreover, with ubiquitous network access and cloud- based solutions assuming a larger portion of the enterprise solution profile, trying to secure all these devices is an exercise in futility. Using legacy endpoint security configuration management solutions in their new mobile device management disguise only succeeds in preventing productive mobile device utilization. Indeed all legacy IT and systems security practices are based on the premise that the device is the center of the IT universe, while ignoring far more valuable critical data.

It’s time to stop the insanity.

Introducing Moka5 – Enterprise AnyWare.

Moka5 fundamentally transforms enterprise end user computing. The M5 platform creates a highly elastic enterprise perimeter where consistent user data and applications are delivered as simply-managed and highly-secure workspaces to popular end-user devices. The device is no longer the center of the action—the stream of data and applications becomes the real focus. Why spend significant cycles and cash managing and locking down commodity hardware designed to be disposed, when the priceless IP generated on those devices remains exposed and vulnerable to user malfeasance?

M5 Enterprise AnyWare delivers:
  • Agile Management
  • Secure Access
  • Device-aware Data

Centralized Control – Distributed Trust

Moka5 requires significantly less management overhead than legacy endpoint security/management or MDM solutions, while offering far more functionality than legacy VDI tools. Moka5 effectively takes your IT organization out of the endpoint procurement, management and deployment business.

New employees, field-based workers or contractors can be provisioned or decommissioned within minutes—without additional server or storage capacity, and regardless of computer make, model, smartphone or tablet. In addition, sensitive documents and IP can be securely shared among a select group of users with vastly more security than cloud-based file sharing options. Most of all, your workers can be both productive and secure online or offline.

Moka5 enables IT to retain centralized control, while allowing for distributed end-user trust for devices and networks creating real enterprise productivity!

Take Moka5 for a Test Drive!

It’s a Holiday Miracle: Real Tips for a Highly Effective BYO Program

Yes, Virginia – there is such a thing as a successful enterprise BYO program and it doesn’t take a Christmas miracle to get it implemented! While virtually everyone in IT believes that a well-implemented BYO program can boost productivity and reduce costs, overcoming the twin obstacles of employee trust and data privacy have effectively slowed the overall implementation of these programs to the detriment of both parties—call it the coal in the Christmas stocking effect.

In fact, according to a study published in CIO magazine, over 70% of employees do not trust their corporate IT group to keep personal information private, even as 80% of employees use their personal devices for work related tasks. Talk about a holiday bummer!

A column written by Software Advice’s Taylor Short—who researches and writes buyer’s guides for help desk and IT professionals—provides keen insight into how Intel overcame significant trust and privacy issues to implement what, by all accounts, is a highly effective BYO program. According to Short’s interview with Intel’s IT Senior Principal Engineer, Alan Ross, the following three guiding principles have enabled them to overcome the trust gap and deliver a BYO program that employees love, and IT can live with.

  1. Establish trust by clarifying what the IT team can see on an employee’s device. Being very precise and clear about those areas that are strictly off-limits to IT eliminates ambiguity and helps to clarify boundaries, thereby preventing unpleasant surprises down the line.
  2. Create security tiers that allow employees to adhere to their preferred level of security monitoring and measures. Everyone has different comfort levels with surveillance, and those levels should correspond directly to the types of tasks and information access they can perform with their device of choice. Setting reasonable limits based on consistently applied policies helps create clarity and ensures that employees use the right device for the right task, without sacrificing their sense of privacy or corporate security.
  3. Establish data containers that separate work and personal data to reassure employees their private information will stay private. As the inventor of the centrally managed localized container, we at Moka5 believe this is absolutely central to a successful BYO implementation. Using containerized data and applications that are isolated from each other allows what belongs to IT to be managed by IT, and what belongs to the employee to managed by the employee.


Since we know that many of you will soon be unwrapping a fancy new tablet or smartphone, we want to make sure you can maximize its use at your workplace; and, that your IT department doesn’t have to play Scrooge again for another year!

A very happy holiday to all from your friends at Moka5.

5 Technology Trends for 2014

Technology is ever evolving, and although there’s no way to say for sure which trends will take the spotlight over the course of the next year, the predictions and trends of the last year help us to predict what technology trends will continue into the new year.

What technology trends are going to be big in 2014? The following are some of the predictions from the team at Moka5.

  1. Continuity Across All Devices  
    Wouldn’t you like to be able to look up an address from your laptop and have the directions populate on your in-car GPS? This kind of device continuity could start to become a trend in 2014.As ITBusinessEdge explained it in last year’s Top 10 Technology Trends for 2013, “With more users working across multiple devices, 2013 will see a move to provide the missing link in today’s computing experience – the ability to pick up the session on a different device in exactly the same place you left off.”Moka5 VP of Technical Services, Lee Wei expects this 2013 trend to continue to gain momentum in 2014. “With Cloud and various AAS (As A Service) as enabling technologies, I believe we will start realizing the ability to have continuity across devices.”
  2. Personal Cloud
    Personal cloud was not only of Forbes’ Top 10 Strategic Technology Trend for 2013, but also among the 2014 strategic technology trends shared by Gartner Fellow David Cearley during Gartner Symposium.This trend opens up the possibility for greater continuity across all devices, because it allows our personal cloud—not the device—to become the center of our digital live and allow us to sync across devices. However, the era of the personal also has the potential to shift the balance of power further towards the user, as devices become less important.
  3. The Internet of Things and DMaaS
    It likely comes little surprise that there are more Internet-connected devices in the U.S. than there are people. The Internet of Things (IoE) will continue to evolve in 2014 as more and more ordinary consumer electronic devices become connected to the Internet.  As this trend moves more into homes and home appliances, Kurt Somerville, Moka5 Marketing Operations Manager, anticipates that the not-yet-created acronym DMaaS (Device-Management as a Service) will likely explode on the consumer level. Since there is no real standard yet according to Somerville, he anticipates that “there will be universal ‘hubs’ where ordinary at-home devices will be able to communicate with a central console—very similar to the current state of managing PCs, Macs, and every other device in the enterprise.” However, this kind of trend isn’t limited to the home, Somerville anticipates that “brick and mortar retail stores will become “alive” relaying important, hyper-targeted location based information to consumers while they are shopping. This is already happening with Apples introduction of iBeacon.”
  4. Flash Storage
    Although some may argue that there are problems that arise with flash storage—aka any data repository or system that uses flash memory—Moka5 Senior System Admin, Jonny Campbell suggests that “flash storage is changing the performance characteristics of all things, since the previous system-internal performance bottlenecks were almost all related to storage.” As a result, flash storage is certainly a trend to watch in 2014.
  5. Software Defined Networking
    2014 will also likely see a continued shift in focus from hardware to solutions made possible by virtualization. As Campbell explains, “Software Defined Networking is poised to put traditional networking hardware providers out of business.” Although big name vendors have succeeded for years by coupling hardware and software into one unified and expensive model, major players like Amazon are now replacing expensive networking components with services that leverage virtualization.

What trends do you predict will be big in 2014? Tweet to us @Mokafive

Pros and Cons of Contract Employees

Nearly one in five small business owners say they’re more likely to hire an independent contractor than a full-time employee, according to results from Inc.com’s August Small Business Scorecard, and they’re not alone. The use of contract employees is not limited to one industry or business size.

Although hiring contract workers can provide benefits to businesses, there are also risks associated. So do the benefits outweigh the risks and how do you mitigate the risks, should your company choose to move forward with the hiring of independent contractors?

Advantages of Contract Workers

There are a number of benefits to hiring an independent contractor as part of your workforce, as opposed to an additional full-time employee, including cost savings and staffing flexibility.

According to a guest article on Forbes regarding the pros and cons of hiring independent contractors, there are several major advantages to using independent contractors, “with financial savings topping the list.” Although employers oftentimes pay independent contractors more per hour than they would pay employees, with contract workers, employers aren’t subject to many of the other expenses that are typically incurred when hiring full-time employees, including: office space and equipment, a share of the employee’ Social Security and Medicare taxes, state unemployment compensation insurance, or worker’ compensation insurance.

Hiring contract workers also provides greater staffing flexibility than hiring traditional employees. Because most independent contractors bring specialized expertise to the job, they can usually be productive immediately, reducing time and costs of training. This, combined with the idea that employers can hire for a specific task or project, make contract workers a good solution for fluctuating workloads.

Disadvantages to Hiring Contract Workers

Although there are a number of benefits to hiring an independent contractor, as opposed to a full-time employee, hiring a contract worker can also pose some risks including: the potential of a government audit, sensitive company or customer information leaks, and malware infections and unauthorized intrusions.

Hiring a contract worker also poses restrictions on firing. Unlike with a traditional employee, your right to fire an independent contractor depends on your written agreement with that individual. As a result, if you fire an independent contractor in violation of the agreement, you could be liable for damages.

However, legal ramifications, should you choose to fire a contract employee, are only part of the risk associated. Depending on the procedures put in place, a former contract worker could have access to internal systems post-engagement. Even in a relationship that does not result in a disgruntled employee, access to internal systems post-engagement, can pose a threat for the hiring organization.

A Solution for Managing Contract Workers

As might be expected, some of the greatest disadvantages of hiring contract employees come from the threats involving how these contractors access data both during and after the engagement. What if you could reap the benefits of hiring contract employees while eliminating these data-focused threats? Moka5 does just that. Benefits of the M5 for Contractor Workforce Solution include:

  • Policy-based secure corporate access regardless of device or network
  • Secure container eliminates data leaks and IP loss
  • Bare metal support reduces management/security costs and complexity of corporate supplied laptops
  • Reduction of CapEx costs related to corporate supplied laptops
  • Simplified image management, updating, and wiping
  • Unified management console for laptops, tablets and smartphones
  • Offline capability enables productivity even in low bandwidth environments

Considering hiring contract employees or need to better manage data being using as part of existing projects? Find out how you can test-drive Moka5 for free.

ROI for Simplified Management with Moka5

Today’s enterprise IT is constantly challenged to deliver more at higher velocity and lower price points. Whether provisioning contractors, offshore workers, or remote employees, the need is apparent for a quicker way to manage, update, and deploy corporate workspaces. There’s got to be a better way than the current crop of heavy endpoint and systems management suites IT has now. Using containerized management solutions isn’t just for mobile devices.  See the payoff for using the Moka5 containerized solution for managing your hard-to-manage PCs. Check out the infographic below for details!

Wired, Tech Target, and MSPToday Discuss the Challenges of Keeping Data Secure

With many still maintaining the assumption that if you manage and protect the physical computer, you’re managing and protecting the data, it should come as little surprise that trends like consumerization of IT and BYOD have made keeping data secure a hot topic in technology.

These recent articles form WIREDTech Target, and MSPToday discuss some of the concerns being faced by the enterprise while trying to keep data safe:

WIRED: Think Server-based VDI Keeps Your Data Secure? Think Again.

In a recent byline for WIRED Innovation Insights, Moka5 Founder and CTO, John Whaley discusses the security risks associated with deploying Virtual Desktop Infrastructure (VDI), the biggest of which being endpoint security. As John explains, “ While data applications reside in the data center, the endpoint itself can easily become a ‘front door’ into corporate systems.”

Tech Target: Six Ways Consumerization Leads to Data Leaks

As Matt Kosht explains in this article for Tech Target, “Consumerization has made employees more productive, but it has also created more risks for data leaks.” BYOD, app stores, and cloud storage are among the six ways consumerization leads to data leaks according to Kosht. There are however, ways to decrease these data leaks. For instance, although some cloud storage options tempt users to keep files in the cloud and access them from anywhere, “you can tightly manage documents with tools such as WatchDox and Moka5 for iOS. These products encrypt document and put rules around their use.”

MSPToday: When it Comes to BYO, Securing the End Device is a Losing Proposition for the Enterprise

As Moka5 Senior VP of Marketing, David Appelbaum explains in his interview with TMCnet contributing editor, Laura Stotler, “There will always be ways to thwart device security and device management. Don’t manage the device, assumer the device is corrupted.” Although Stotler considers it a bold approach, with the push towards BYO, she also considers “Moka5’s concept of protecting data and not individual devices…a sound one.”


Need a way to lock down and liberate your endpoint IT infrastructure? Learn more about how Moka5 can provide secure data storage, anywhere, any time, and on any device.