Since it\u2019s called BYOD, bring your own device, you might think it\u2019s all about, well, the device. Think again. The impact of BYOD on corporate networks and data security is profound. For a thorough, yet succinct exploration of this topic, take a look at this Executive Viewpoint\u00a0with Kurt Roemer, Chief Security Strategist, Citrix.\n\nMobility and the Dynamics of Networking\n\u00a0\n\nHere\u2019s the gist: When BYOD emerged onto the scene about seven years ago as employees started bringing their iPhones, iPads and Android devices to work, a shoe was thrown into the works of enterprise governance. By not using enterprise networks, those users bypassed the security architecture put in place by IT \u2013 a security architecture that had taken years to get right.\nInstead of relying on a solid, proven architecture, it is now necessary to assume that the devices, applications and networks of BYOD users are under attack and must be constantly verified. Roemer\u2019s recommendations:\n\nEncrypt all application and network traffic.\nUse mutual authentication -- require client-side certificates for administrators and sensitive applications.\nUse two-factor authentication where appropriate.\nPut strong logging and audit policies in place.\n\nWell and good, but what about the user experience? Superior ease of use and greater functionality are why those devices showed up in the first place. To make the experience seamless, the security technologies should be automated. For example, a micro-VPN should kick in when a person picks up a device and launches an application.\n\u201cThat way they\u2019re only going to the servers they should and to the applications they should. The data is protected without any additional user intervention or device configuration. And everything is fully logged for information governance and regulatory compliance,\u201d says Roemer.\nWith the Citrix mobile workspace solution, when a user opens up a mail or Web app, the solution initiates a microVPN on the mobile device, enabling the user to access corporate network sites or resources. Check out this link for more on MicroVPNs.\nWhat happens on the server is part of it also. \u201cMobile back-ends must have security as part of the profile, specifying the application security, the network security and security for critical services like DNS to be automatically configured,\u201d Roemer says. Meanwhile, on the mobile devices, containerization keeps local data safe and interfaces with the enterprise network for authentication, single sign-on, encryption management and telemetry.\nThere\u2019s a lot to it. But automation ensures the user a secure, seamless and above all, productive experience. It\u2019s a comprehensive architecture for BYOD in which the network, as it should, plays a central role.