{"id":27299,"date":"2014-09-23T15:31:06","date_gmt":"2014-09-23T15:31:06","guid":{"rendered":"https:\/\/udsenterprise.com\/byoid-adoption-and-new-security-risks\/"},"modified":"2023-09-21T13:13:36","modified_gmt":"2023-09-21T13:13:36","slug":"byoid-adoption-and-new-security-risks","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/","title":{"rendered":"BYOID adoption and the new security risks"},"content":{"rendered":"<p>The Ponemon Institute and CA Technologies have publised a research which analyses this new situation:<\/p>\n<p><a href=\"http:\/\/www.ca.com\/us\/news\/press-releases\/na\/2014\/business-and-it-emerge-as-essential-allies-in-the-move-to-social-ids-and-bring-your-own-identity.aspx\" target=\"_blank\" rel=\"nofollow\">Business and IT Emerge as Essential Allies in the Move to Social IDs and \u2018Bring Your Own Identity\u2019<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.<\/p>\n<p>The employees welcome this option, as they don&#8217;t need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.  <\/p>\n","protected":false},"author":2,"featured_media":15789,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1125,985],"tags":[1126,986],"class_list":["post-27299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-byod-en","category-hot-news","tag-byod-en","tag-hot-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BYOID adoption and the new security risks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOID adoption and the new security risks\" \/>\n<meta property=\"og:description\" content=\"A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.The employees welcome this option, as they don&#039;t need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-23T15:31:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T13:13:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"BYOID adoption and the new security risks\",\"datePublished\":\"2014-09-23T15:31:06+00:00\",\"dateModified\":\"2023-09-21T13:13:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/\"},\"wordCount\":40,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/id-10067846.jpg\",\"keywords\":[\"BYOD-en\",\"Hot news\"],\"articleSection\":[\"BYOD-en\",\"Hot news\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/\",\"name\":\"BYOID adoption and the new security risks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/id-10067846.jpg\",\"datePublished\":\"2014-09-23T15:31:06+00:00\",\"dateModified\":\"2023-09-21T13:13:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/id-10067846.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/id-10067846.jpg\",\"width\":400,\"height\":259},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/byoid-adoption-and-new-security-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD-en\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/category\\\/byod-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BYOID adoption and the new security risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/VirtualCable_\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/virtualcable\",\"https:\\\/\\\/www.youtube.com\\\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BYOID adoption and the new security risks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/","og_locale":"en_US","og_type":"article","og_title":"BYOID adoption and the new security risks","og_description":"A new technological trend has arisen after the massive adoption of BYOD (Bring Your Own Device) by most users, who use their own mobile devices for both personal and proffesional purposes. This new trend is called BYOID, Bring Your Own Identity, and it is based on the use of the same digital identities used in the social media profiles to access corporative applications.The employees welcome this option, as they don't need to create different accounts for the different web sites they access everyday but the IT departments face new necurity risks. Companies must catch up on this trend and make the adoption easier for the staff without threatening the security of corporate data.","og_site_name":"UDS Enterprise","article_published_time":"2014-09-23T15:31:06+00:00","article_modified_time":"2023-09-21T13:13:36+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"BYOID adoption and the new security risks","datePublished":"2014-09-23T15:31:06+00:00","dateModified":"2023-09-21T13:13:36+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/"},"wordCount":40,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/id-10067846.jpg","keywords":["BYOD-en","Hot news"],"articleSection":["BYOD-en","Hot news"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/","url":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/","name":"BYOID adoption and the new security risks","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/id-10067846.jpg","datePublished":"2014-09-23T15:31:06+00:00","dateModified":"2023-09-21T13:13:36+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/id-10067846.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/id-10067846.jpg","width":400,"height":259},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/byoid-adoption-and-new-security-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"BYOD-en","item":"https:\/\/udsenterprise.com\/en\/category\/byod-en\/"},{"@type":"ListItem","position":3,"name":"BYOID adoption and the new security risks"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/27299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=27299"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/27299\/revisions"}],"predecessor-version":[{"id":27412,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/27299\/revisions\/27412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/15789"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=27299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=27299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=27299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}