{"id":75602,"date":"2023-05-23T20:34:06","date_gmt":"2023-05-24T00:34:06","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75602"},"modified":"2024-08-20T08:47:35","modified_gmt":"2024-08-20T12:47:35","slug":"get-started-manage-personal-devices","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/get-started-manage-personal-devices","title":{"rendered":"Get Started: Manage Personal Devices"},"content":{"rendered":"\n
IT infrastructure and workplaces are changing to support devices with multiple platforms and operating systems. With an increase in remote workers, more corporate and personal devices are being used. JumpCloud can easily work with any device running Windows, macOS, or Linux.<\/p>\n\n\n\n
Using personal devices can be cost-beneficial and also give employees flexibility when using a device or OS they know, but this freedom comes with responsibility for the employee and your company to follow appropriate security guidelines, legal best practices, and regulations. <\/p>\n\n\n\n
Personal devices are individually-owned devices that employees bring into your corporate work environment. As advantageous as managing personal devices sounds, there are some major security risks and recommendations to follow when you add these devices into your company\u2019s network, applications, and resources. <\/p>\n\n\n\n
Create company policies, practices, and requirements – Allowing employees to use their own devices to access your corporate network and resources can open up multiple security risks because the company does not own that device. You should create internal company policies, practices, and requirements around using and leveraging personal devices. Data security, application authentication, and intellectual property are all things that you need to consider. <\/p>\n\n\n\n
Enforcing good security practices and measures for both personal and corporate devices ensures that the applications your employees use are centrally managed and they have device security policies in place for you to safely manage these devices. <\/p>\n\n\n\n
Create a legal and security policy around company proprietary data and the personal device – There are additional security considerations when you manage personal devices in your company\u2019s infrastructure, processes, and workflows. You should create a legal understanding of intellectual property rights between the employee and the company. If personal devices are used for corporate work, confidential corporate data might be saved on the personal device which can cause issues when the employee leaves the company. Creating a legal and security policy around company proprietary data and the personal device with the employee is critical to protecting your company\u2019s assets. <\/p>\n\n\n\n
The result of not having security policies and related practices and requirements in place can lead to a potential data breach. Often, companies do not remove company data from the employee’s personal device after the employee leaves the company.<\/p>\n\n\n\n
Using personal devices could be cost-beneficial and gives employees flexibility when using a device or OS they\u2019re already familiar with, this freedom comes with responsibility for the employee and company to ensure that the security, legal best practices, and regulations are followed. <\/p>\n\n\n\n
JumpCloud\u2019s software lets you manage any device running on macOS, Windows, or Linux OS. The JumpCloud System Agent allows you to seamlessly manage personal and corporate devices while enforcing security policies and user account management. You can control which users are authorized to access your company networks, applications, and other JumpCloud resources. <\/p>\n\n\n\n
The JumpCloud System Agent lets you create and apply a corporate account and security policy on each type of personal device to help you manage that user\u2019s account.<\/p>\n\n\n\n
Use these guidelines when managing a user’s account:<\/p>\n\n\n\n
IT infrastructure and workplaces are changing to support devices with multiple platforms and operating systems. With an increase in remote […]<\/p>\n","protected":false},"author":203,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[2854],"support_tag":[],"coauthors":[2837],"acf":[],"yoast_head":"\n