Anyone interested in technology will know that the mobile boom has brought with it new considerations for businesses in the form or BYOD (Bring Your Own Device). Despite still being a concept that many companies are yet to fully grasp, it is about to be overtaken by a new mobile trend.
WYOD (Wear Your Own Device) is hot on its heels, as wearables and smartwatches continue to gain traction. To shed some light on the growth of WYOD and what businesses need to do to stay ahead of the curve, I spoke to Paula Skokowski from mobile file sharing provider Accellion.
The BYOD trend is something that often creeps up on companies as employees take the initiative in using their own kit. That can leave businesses with a BYOD environment but no proper policy.
There are many potential benefits to BYOD in terms of employee efficiency and morale, but that's of limited use if it puts the safety of commercial data at risk.
Android has successfully secured its place as the most used mobile operating system. With this in mind it should come as little surprise that more and more people are bringing Android devices into the workplace -- and for IT departments this can be something of a security nightmare. Today Google announces Android for Work with the aim of grabbing the BYOD (Bring Your Own Device) market and making Android more secure and manageable in the workplace.
What does this mean? Work profiles are being introduced to keep business apps and data separate from each other, so employees can use a single device to manage their personal work life. For both employer and employee this brings a number of advantages.
Businesses are turning increasingly to mobile devices as means of boosting productivity, but if employees are allowed to use their own devices for work it can be difficult to ensure they use approved apps.
Licensing and compliance specialist Flexera Software has a solution in the form of its App Portal. This is a universal enterprise app store which allows self-service delivery across platforms.
The debate on both sides continues: the pros and cons of incorporating the BYOD concept into the workplace. BYOD has, indeed, become a hot topic where debates on both ends of the discussion-spectrum range from 'lower business costs and happier employees' to 'security hazards and added burdens on IT departments'. Even though proponents would argue that the benefits of incorporating BYOD into business environments outweigh any risks, one only has to examine those very risks to realize their potential for harm is too concerning and cannot just be swept under the proverbial rug.
Here are five reasons your company would want to think twice before adopting a BYOD strategy:
Utilizing the power of cloud technology and mobilizing the workforce are two key interests for most organizations, but several issues are currently affecting progress in the field.
In a survey conducted by NaviSite and Time Warner Cable on migration to the cloud and BYOD (bring your own device) support, several key points were brought up on the reasoning behind the slow progress.
Mobile device management (MDM) solutions have been an enterprise mainstay for years, enabling IT to manage enterprise-owned smartphones and tablets in a way similar to how PCs and laptops are managed -- by taking complete control of them. But when it comes to personal mobile devices entering the IT environment via bring-your-own-device (BYOD) programs, MDM solutions struggle to provide the flexibility that IT now requires.
As the name states, MDM is focused on managing devices. It allows IT to control the entire environment of a smart device: provisioning, tracking usage and location, enforcing policies, ensuring security encryption, pushing approved enterprise apps to the device, and locking the device down or wiping it if necessary. It is a heavy-handed but very useful approach to managing corporate-owned smartphones and tablets. When it comes to personally owned devices, however, IT cannot take the same approach. Users don’t want to give IT complete control over their device. They don’t want their usage and location tracked when they aren’t at work. They don’t want to be limited in the kinds of apps they download and use. And they don’t want to give IT the power to access or wipe personal information, such as photos and text messages.
Enterprises continue to struggle with Bring Your Own Device (BYOD) as employees continue to demand the freedom that comes with mobility in accordance with new trends. Security has long been discussed as the primary challenge when it comes to BYOD. Yet, other reasons such as network access is fast becoming a key concern for IT departments but also the key frustration for employees.
When it comes to connectivity, employee expectation is that it just works and as such this expectation must not be overlooked when implementing a BYOD roll-out.
According to a new survey carried out for security device specialist Kensington, 73 percent of executives recognize that BYOD presents greater risks for the organization.
However, 59 percent still approve the use of personal devices for business use and to address concerns 55 percent are planning to invest more in physical security.
Allowing employees to use their own devices for work is increasingly popular, but it can present problems for smaller businesses when it comes to implementing the technology and keeping it secure.
California-based hopTo has an answer for small and medium businesses in the form of its mobile productivity platform hopTo Work. The platform provides instant BYOD functions with a flexible and secure mobile workspace.
I've been in the market long enough to have lived the glorious years when as a salesperson, you would join a new company primarily because of the salary and benefits it offered above any other consideration.
At that time, one of the important benefits was the company car, and once you had it, the next question was; how flexible would the company be around its use?
BYOD was once a buzzword coined to describe the increase of end-user owned devices entering the workplace and accessing corporate networks and applications. However, there are now a lot more smart mobile devices on the network which are running more bandwidth-intensive applications, than ever before. This is only set to increase according to IDC who predict that 79 percent of mobile devices in the enterprise will be "employee liable" by 2017.
Having a BYOD strategy is too invaluable to be cast aside, yet it still presents a number of challenges to IT managers, who need to ensure the security and integrity of their corporate resources and data. But at the same time they need to allow multiple users, including guests and employees, the flexibility they demand for using different devices, whether corporate-issued or part of the BYOD trend.
According to a survey of IT decision makers commissioned by efficiency software specialist 1E and carried out by Vanson Bourne 86 percent of companies that ban employees from using their own PCs do so because of security concerns.
To address these fears 1E is launching its new MyWorkNow solution, a client-hosted virtual desktop (CHVD) to offer a fast, low-cost way of mobilizing workforces using their own PCs.
Embracing the digital revolution is unavoidable for businesses. It has brought great advantages with it too, such as anytime, anywhere communications and the storage of vital and personal information for use in our work and personal lives. It has also provided greater flexibility in where and how we work and communicate, making things much easier for us.
However, it is important to acknowledge security aspects when evaluating mobility policies in particular. Cyber attacks are on the increase and will continue in their complexity and frequency. We hear about serious breaches on a daily basis. This can range from password leaks or mobile phone hacks to international scale bugs. I often find that in the corporate world, many recognize the threats but fail to implement any strategy, let alone take tangible action. The good news is that there are steps that can be taken by businesses to drastically improve mobile security.