Monday, 29 January 2018

Bring your own device (BYOD)

Bring your own device (BYOD)—also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)—refers to the policy of permitting employees to bring personally owned devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications. The phenomenon is commonly referred to as IT consumerization
BYOD is making significant inroads in the business world, with about 75% of employees in high growth markets such as Brazil and Russia and 44% in developed markets already using their own technology at work. Surveys have indicated that businesses are unable to stop employees from bringing personal devices into the workplace. Research is divided on benefits. One survey shows around 95% of employees stating they use at least one personal device for work.
    
   

New trends 

  The proliferation of devices such as tablets and smartphones, which are now used by many people in their daily lives, has led to a number of companies, such as IBM, to allow employees to bring their own devices to work, due to perceived productivity gains and cost savings. The idea was initially rejected due to security concerns but more and more companies are now looking to incorporate BYOD policies, with 95% of respondents to a BYOD survey by Cisco saying they either already supported BYOD or were at least considering supporting it. Recent study by Enterprise CIO talks about BYOD and informs that incorporating a BYOD culture can boost productivity by 16% over a 40 hour week.friendly.


Definition:

BYOD, or Bring Your Own Device, implies company policies drawn out to enable employees to bring their personal mobile devices – including smartphones, laptops and tablets – to their place of work and also make use of them to access data and information exclusive to the company they work for. These policies can be drawn out by all, establishments irrespective of their field or industry.
                           BYOD is now emerging as the future of enterprise, as most employees make use of their personally-owned gadgets and technology while at office. In fact, some companies believe that this trend may actually make employees more productive, as they are more comfortable working with their own mobile devices, which they are most comfortable with. Enabling BYOD also helps employees perceive them as more progressive and worker-friendly.

  

Pros of BYOD

  • Companies adopting BYOD policies can save much money spent on purchasing high-end devices for their employees’ use. They can also rest assured that employees would take better care of these gadgets, as these are their own personal devices.
  • Employees are more comfortable handling their own gadgets rather than use unfamiliar technology provided by their company. This also makes them feel more in control in the office environment.


    IT support and management.

    Authorizing employee-owned devices in a corporate setting can be a challenge for the IT administrator, as it involves deciding on the role-based device commissioning and level of permissible access to corporate resources. Regulate employee access to corporate data Mobile Device Manager Plus, providing simple solutions to enroll devices based on ownership. The application also includes:
  • Separate group policies for BYOD and corporate-owned devices.
  • Support for iOS, Android, and Windows platforms.
  • Active Directory for device authentication.
  • Policy settings, such as managing Wi-Fi, corporate email accounts, and media options.
             

Containerization is key.

Separation of corporate and personal information in each device is the best possible way to manage and secure corporate data in a BYOD environment. Containerization is also ideal for the device owners, as keeping their personal data intact. Some of the key attributes of containerization, which is supported in Mobile Device Manager Plus, are as follows:
  • Enterprise data is stored in an encrypted container.
  • User experience and privacy are not compromised.
  • Regulated corporate data wipes for employees who leave the organization.
  • Containerization of official mobile apps to block outside apps from accessing corporate data.
 

No comments:

Post a Comment