Bring-Your-Own-Device: An Adept Mobility Initiative

by Administrator 6. January 2014 23:22

Overview

 

Bring-your-own-device phenomenon, believed to be the future of corporate computing, is seen as one of the most radical shifts in the enterprise computing. With the introduction of more and more efficient mobile devices that are replacing PC computing and the shift in operational paradigms, the emphasis has already shifted to ease of computing from place of computing. More and more techies are adopting this due to the flexibility it offers resulting in attractively increased efficiencies. The employees are happy and so are the employers with the productivity benchmarks stretching to greater levels. But that is one side of the coin. With this kind of disruptive setup a lot of things are being exposed. For example, enterprise data security is jeopardized big time. The authenticity of operations may also be compromised and the cons list may be alarming due to the possible adverse effects.

 

Adoption

 

Technology can virtualize a wide spectrum of activities in different functions within the organization. Hence BYOD can apply to people from various functions within the organization in both technology and non-technology firms. In order to reduce the operating costs and the infrastructure costs, some companies are encouraging the employees to bring their own devices to the work place. This is a certain indication that this trend will catch up to a higher percentage in the near future.

There is a certain significant reduction in the investment on IT but the IT policies and the software being used have to be revised to facilitate the employees to use their own devices as the device profile ranges from cheapest of the mobile devices to the premium class ones.

 

A few things to consider while allowing BYOD

 

Who qualify?

The employers need to figure out and segment who qualify for adopting the BYOD. Since people from various functions may perform tasks on their own devices, the organizations pertaining to various business lines first need to identify the segments of employees that can be allowed to adopt BYOD.

 

Ø  Segment of employees that need to be allowed

Ø  Segment of employees where there is no necessity to adopt BYOD

Ø  Segment of employees where organizations cannot allow BYOD

 

There are many global organizations particularly in the financial and technology sectors that do not even allow the smartphones into the workplace and quite understandably for obvious reasons. Such organizations first need to exercise on how BYOD can help improve efficiencies of the employees and if so, who all should be allowed to adopt the phenomenon. The same can be exercised by other organizations as well since the chance of intrusion into company’s data is very high, the people and the devices need to be clearly sorted out.

 

Security

 

As flexible as it is BYOD also exposes resulting vulnerability in the processes. The employees may tend to violate the rules, regulations, trust of employers, intellectual property and critical business obligations to name few. Also the permissions to be set have to be concrete. What is allowed when the employee is within the corporate network and also when one is outside the network? Since the data on the devices is both personal and organizational, if left unmanaged, BYOD can lead to loss of control, impact the network availability, and cause data loss. The organizations need the right network access strategies and policies in place to secure your environment. The bigger problem would arise with stolen or lost devices.

 

Conclusion

 

The right strategy devised to implement BYOD will certainly empower people to improve the productivity and collaboration. From the organizations perspective, IT needs, will be redefined to provide a single comprehensive security solution that addresses the privacy and risk management mandates. This adept mobility initiative gradually but surely migrates the enterprise computing to mobile computing.

Tags:

Add comment

  Country flag

biuquote
  • Comment
  • Preview
Loading

© WINIT 2012. All rights reserved.