BYO IT schemes unpopular with CIOs: report
- 06 July, 2010 09:30
Despite the rise in popularity of consumer technology, Australian CIOs still favour purchasing their employees' IT equipment, with 73 per cent preferring this method more than Bring Your Own Technology (BYOT) schemes.
The figure comes from IDC's global consumerisation of IT research (sponsored by Unisys) based on 2820 responses. The research surveyed 302 consumer respondents and 60 business respondents in Australia.
Dematic CIO Allan Davies began employing a Bring Your Own PC (BYOPC) model in his workplace after staff interest increased during the GFC and in an attempt to prepare the organisation for Gen Y employees.
"In our yearly IT customer satisfaction survey a number of employees commented they had bigger, better, faster PC's at home and by providing our standard equipment we were hindering their ability to be productive. The concept of BYOPC was to allow these users to bring their 'higher spec' PC's to work if they so desired," Davies told CIO.
Davies said 44 per cent of employees showed interest in the scheme in the ANZ region of Dematic, but in the Asia-Pacific region this number was much higher with 59 per cent of employees seeing the benefit of a BYOT scheme.
IDC's research indicates IT policies around BYOT schemes are still being formed in most workplaces, with an increase of 21 per cent of the Australian organisations surveyed expecting to need more support for staff PDAs, and 17 per cent more needing greater support for staff PCs and Netbooks.
Davies believes a mismatch in expectations between IT leaders and employees can occur when BYOT schemes are adopted, even when clear policies around the technology are developed.
"There can be an expectation IT will provide a company issued PC in the event of a failure, even though this is clearly addressed in the BYOPC policy," Davies said.
When asked whether CIOs should consider implementing a BYOT or BYOPC scheme, Davies said it depended on the needs of each organisation.
"Each CIO needs to evaluate their particular circumstance and gauge the support for this concept from the end users as well as the company's executive management team. My experience has shown regardless of what users say they want, they are reluctant to invest their own money in technology to use at work. They still believe this is the businesses' responsibility," Davies said.
General manager of Unisys Asia-Pacific, Lee Ward, said the findings come as no surprise when the risks associated with BYOT schemes are weighed up.
"New IT purchasing models bring greater freedom of choice to employees to choose the IT device they want for work. However, employee-owned IT models also bring a number of new issues for the employer to manage in terms of the ability to manage or search corporate data on the device, [whether] adequate security measures are in place and who is responsible for maintenance and insurance," Ward said.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
NetApp FAS6240 Clustered SAN Champion of Champions
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.