The right policies help hold down costs and protect company interests.
Of all the buzz words or phrases in business and industry, one of the most talked-about in the technology and business world in 2012 is BYOD: Bring Your Own Device.
Simply put, BYOD entails any personal device an employee uses to connect with the organization’s network: laptops, smartphones, tablet technology, etc. Smartphones and tablets have skyrocketed in popularity in recent years. According to Gartner Research, there were 472 million smartphones sold in 2011 (up 58 percent from 2010) and tablets will out-sell desktop computers by 2013, according to Forrester Research.
Allowing employees to bring their own wireless device into the workplace to increase their productivity and decrease corporate cost is very appealing. Employees can handle business-related phone calls and e-mail at any time, which can increase productivity or their transactions per day. Since the employee paid for the device and the monthly charge, there is a decrease in corporate costs.
The biggest cost to the organization will be the lack of policy, both procedural and security. Business leaders have two options: allow and develop a BYOD strategy—or don’t. However, these devices are here to stay; if you don’t develop a plan with your business’ most important asset—your data—you’re taking a huge risk.
Security is a major concern and key factor when deploying a BYOD strategy. An organizations’ data and intellectual property may be its lifesblood. A poorly executed BYOD strategy can leave it extremely vulnerable. Organizations are rightly concerned about the security of the data, viruses, performance and monitoring usage to contain costs. There is a way to deploy a BYOD strategy, however, to ensure the integrity of a corporations’ network and data.
It is estimated that 80 percent of enterprises lack a Mobile Device Management system, which protects corporate assets on an employee-owned device. With a solid MDM system, an organization can monitor and control the applications that users are running, and prevent users from running over on minutes or using applications that are “black-listed” on the corporate network. The same policies that are deployed for the devices that are physically connected to the network can be enforced for those who have wireless connections. Passwords are protected, applications (such as Angry Birds) can be prohibited, device software can be kept up to date and a device can immediately be wiped clean if it is lost or stolen.
There are two alternatives to a BYOD strategy. One option: employer-provided devices. An employer-provided device is the safest and most secure manner to deploy a wireless strategy for laptops, smartphones, tablets, etc. This allows an organization to get the benefits of the devices (mobility, increased productivity without an increase in cost) but make them just as secure as a computer physically plugged into the corporate network. The same corporate policy for passwords, anti-virus, etc. can be enforced with a good MDM system. These devices will follow the same corporate policies and standards that traditional desktop PCs do.
The second option is a hybrid solution, a company-provided device, or an employee-provided device where the employees are responsible for the monthly charges—BYOD. This way a company gets the productivity benefits for all employees, but only incurs the cost for the employee of their choice (i.e. sales reps, road warriors, executives, etc). This, again, is done with an MDM system. The same MDM system that is deployed for a BYOD strategy can be used for employer-owned/provided device. This option provides the same security and policy enforcement for all, but without the overhead and cost of an employer-owned device. An organization is not forced to pick a strategy; it they can choose one based on its needs today and in the future. The best of both worlds.
The key to developing a BYOD strategy is to find a systems integrator with wireless experience and knowledge, someone you trust. A good integrator will help you develop a common sense approach to BYOD and help you avoid the pitfalls of a poorly executed BYOD strategy.
Don’t be afraid of BYOD—it’s not just a buzz word—it’s here to stay. Embrace it, understand it and learn how to use it to your advantage. You’ll be glad you did
Jeff Potter is a solution consulting manager for Vital Support Systems in Kansas City.
P | 816.977.2200
E | jeff.potter@vitalsite.com
Return to Ingram's May 2012