For recent BYOD news articles, please > click here <
BYOD, which stands for bring your own device, is now a common phrase in the IT world. It can be thought of from two perspectives:
- Employees that prefer and want to use their own devices for work
- Companies that require their employees use their own devices for work
Bring your Own Device
Companies may also take a hybrid approach to BYOD by allowing certain employees to use their personal devices depending on the function they perform within the organization. Many companies are now developing a BYOD policy to control employee device use.
Implementing policies, especially when it comes to technology use within your organization, goes a long way to clear the air and let employees know what they can and cannot do. It reduces any confusion and prevents discrepancies from occurring.
A BYOD policy defines the set of rules and regulations that manage a company’s level of support of the used of employee owner devices, such as computers, laptops, mobile phones and tablet. The policy often outlines:
- Which devices can be used
- What devices are allowed to be connected to the company network and resources
- The level of access each employee has with their personal devices
- Who within the organization can use personal devices
BYOD policies vary from organization to organization, and can take on many forms. However, it often comes down to what is the best environment for worker and for the organization.
Since high quality technological devices have become so affordable and widely used, it has become increasingly difficult to deny employees use of personal devices for business purposes. This is why there is a growing need for a BYOD policy that is not only flexible, but helps companies ensure their network remains secure and free from threats.
Benefits of a BYOD policy
A BYOD policy has its benefits. They include:
Potential issues with implementing a BYOD policy
- A reduction in hardware and technology costs.
- The ability for employees to work from any remote location
- The ability for employees to have access to company resources at all times
- The policy enhances an employee’s ability to be as productive as possible
- The shift in maintenance tasks to employees, reducing the strain on IT.
While there are a number of benefits, there are also a number of potential drawbacks associated with implementing a BYOD policy. They include:
- There is an increased security risk associated with users connecting with personal devices
- Once a person leaves the organization, companies must revoke access. Not doing so would leave the organizations networks open
- There is a great risk of malware and viruses
Wednesday, June 20, 2012Managed communication services move to the cloud But an analyst says VoIP doesn't provide compelling cost incentives to move to the cloud
Tuesday, June 19, 2012Dell exec outlines health care trends at Toronto conference Health care needs data for better collaboration and management, the company's chief medical officer says. Find out why people want to manage their own health information
Monday, June 18, 2012Killer apps for software defined networks What you need to know about OpenFlow and SDNs
Thursday, June 14, 2012AT&T to expand Toggle BYOD service to PCs, Macs The service sets up separate work and personal environments on mobile devices
Tuesday, June 12, 2012Avaya: Flare video support coming for iPad, Windows PCs, Android Avaya says it is pushing ahead with plans to develop its video tablet
Wednesday, June 06, 2012Treading softly, diving deeper into mobile malware Wedge Networks, a Web security company based in Alberta, has released a cloud-based platform that the company says will use big data analytics to round up suspect malware before it gets into mobile devices
Friday, May 25, 2012Cisco kills off Cius development The company caves to the BYOD trend, though it will still make the purpose-built videoconferencing tablet available for customers with specific use cases
Friday, May 18, 2012Cisco bundles target BYOD, mobile virtual desktop Solutions package mobile device management, virtualization infrastructure, audio and video products
Monday, May 14, 2012Is your BYOD policy out-of-date? The realization that more end users are learning how to browse anonymously has made the option to block access to proxy servers a common policy decision
Friday, May 11, 2012Balancing BYOD and data security SYMANTEC VISION 2012 The security vendor takes an app-centric approach to managing employee-owned devices. Why one analyst thinks it won't be a one-horse race for long
Tuesday, May 01, 2012iPad in the enterprise: IT must stay ahead of the curve The CTO of one services firm describes how "guerilla tactics" by end users are putting the IT department behind the eight ball
Thursday, April 19, 2012Boom, bust and CIOs The demographic researcher looks back at his predictions from 16 years ago and outlines some of the implications for chief information officers. Coverage from CIOCAN Peer Forum 2012
Tuesday, April 17, 2012Trend Micro: Cloud demands new security model Virtual environments, private and public clouds have to be secured from within, and data needs to "defend itself no matter where it goes," says chief product officer
Friday, April 13, 2012SecureZIP for iOS targets employee side of BYOD PKWare aims to prevent data breaches by securing files on employee mobile devices, but one analyst wonders if the policy is enforceable. Plus, why the company passed on developing a BlackBerry version
Wednesday, April 11, 2012Nokia Lumia 900's software bug is not its biggest problem OPINION A bad start to what was supposed to be a major competitor against Apple's iPhone can be overcome. But it will take better features and marketing that appeals to consumers and IT departments alike
Thursday, March 22, 2012BYOD? Bring it on! Users want their own devices at the office, but the fears remain rampant. The head of IT security at ATB Financial walks through his organization's approach to grappling with the consumerization of IT
Monday, March 19, 2012Android-friendly Linux 3.3 released Android can now boot from the Linux kernel. Does this mean Android smart phones will have comparable management features to BlackBerrys?
Tuesday, March 06, 2012Microsoft pitches Windows 8 to CIOs at CEBIT 2012 Kevin Turner says BYOD will force IT departments to look more closely at Metro-style applications and Windows to Go technology as a way to satisfy users. Full details on the demo
Monday, February 27, 2012SAP, Symantec upgrade mobile device tools MWC The abbreviation BYOD is on the lips of all the mobile device management vendors at the Mobile World Congress in Barcelona
Thursday, February 09, 2012How Cisco copes with the BYOD movement When software developers insisted on bringing PCs running Unix into the company, the network equipment maker had to respond
Wednesday, January 25, 2012BYOD in hospitals? The debate rages on Should healthcare institutions let staff bring their own devices? The battle’s lost, says one CIO. Not yet, replies a medical researcher
Wednesday, January 18, 2012Big data will drive big hires, Deloitte says PREDICTIONS 2012 Mobile payments, big data and the rise of multi-tablet households will likely dominate IT trends this year, according to Deloitte & Touche
Tuesday, January 17, 2012The real force behind the consumerization of IT People see it as a new trend, but people have been using their home PCs and Macs -- systems not typically under strict IT management -- for years
Wednesday, January 04, 2012Mobility, cloud, analytics to reshape IT in 2012 The North American, and particularly U.S. IT climate will see a shift in shape and focus in 2012
Thursday, December 22, 2011Predictions 2012: Buzzwords and BYOD The third of three parts in our editorial round table series focuses on the future of the bring-your-own-device phenomenon in 2012. User strike or IT backlash?