Pearl Software Blog

Internet Monitoring and Web Filtering Topics

The Internet and Employee Productivity - Part 1 of 3

Three Part Blog

Part I: The Internet and Employee Productivity

Competitive enterprises exist to prosper and therefore must operate with efficiency. Corporate stakeholders are tasked to keep labor and material costs low, justify investment in capital and variable expenses and protect the enterprise from contingent and potentially crippling liabilities derived, for the most part, out of negligence (lawsuits, product recalls, negative publicity, physical and IT infrastructure damage and disrepair). We continue to hear that productivity gains are paramount to controlling inflation and keeping manufactured goods competitive in world markets. In order to control costs and maintain your company’s competitive advantage, it is incumbent upon Management to identify and rid the corporation of malingerers and identify those that are less productive. Functional units need to keep their house in order to reduce the probability of extraneous costs. Operational efficiency takes on new meaning in times of economic contraction. Add the constant spate of corporate governance and consumer privacy legislation and you have a recipe that only disturbs the delicate balance managers must deal with as they attempt to meet requirements without destroying employee morale. In considering employee Internet access, clear thought needs to be given to productivity, liability and security. More...

BYOD Policies for the Enterprise - Mobile Device Management (MDM)

Although BYOD (Bring Your Own Device) is a landscape that is constantly in flux, developing a policy for BYOD security is a critical first step in stabilizing this environment.  Businesses and institutions need to understand that there are many things that they can do to create a strong security policy. This can be accomplished by realizing that there are a number of fundamental policy concepts that can provide a framework that will accommodate the changing landscape.

Since employees desire to use all manner of mobile devices in the workplace, security is the primary concern. Consequently, the policy must work hand in hand with the security measures that are enacted by the IT department. Although the goal is to clearly define those devices that can be used and how they can be used in the workplace, IT departments must work in partnership with other major departments and C-suite level players to make these determinations.

Not only should the BYOD policy clearly define accepted devices as well as the resulting security policy for each, they must also describe the security software requirements as one of the security that would be in place. Its best to choose a software solution that can allow remote monitoring, blocking and filtering of the activities on a wide variety of devices as well as respond to Apps, private clouds, Wi-Fi networks and remote desktop services. More...