BYOD not a big deal?
- 18 May, 2012 07:00
While BYOD might be one of the latest buzzwords doing the rounds, some major companies have said they are not yet witnessing the trend in their own companies.
Adam Bennett, CIO at NAB, told CIO he wasn’t seeing demand from employees or executives to bring in their own devices. Despite this, the company is putting in measures to accommodate future mobile device use.
“We are running pilots for people to use iPads and things like that and we’re pushing those options to people. But I think widespread BYOD is at least certainly a little way off and I think whenever you embark on something like that, you really have to evaluate it in a sense of ‘ok, what does that mean for the business?” he said.
For example, examining security and HR issues.
“There’s a whole raft of things that need to be worked out and that’s where, again, from the trials and pilots that we’ve been running, we’ve been extremely careful to make sure we’re safeguarding the bank’s information data and systems and really doing it in a controlled fashion,” Bennett said.
“...but I guess I’m yet to see a massive business case of how people bringing in their own devices will increase the share price.”
Westpac’s CIO, Clive Whincup also recently told the Australian Financial Review he was not witnessing demand from staff to bring their own devices to work and therefore did not see a need for a BYOD policy. Instead, he said a policy would be set on a case-by-case basis.
“We are still controlling what people can use. We deploy iPads, iPhones and BlackBerrys but the biggest single issue is whether people’s working practices and behaviours change to the degree that they want to be able to choose their device,” he said.
A recent survey by Gartner confirmed global companies have BYOD on their radar.
The survey found CIOs believe 38 per cent of laptops, tablets and mobile phones will be employee-owned in the US and 20 per cent in the UK in two years.
“BYOD is an inevitable requirement that comes about as a result of the wave of consumerisation of mobile devices, regardless of related policy haves or have-nots,” the report stated.
“A formal mobility strategy team should be [established] as part of the IT department for data management and control. In addition, enterprises should create a BYOD policy for balancing cost control and reimbursement.”
The survey found BYOD demand was highest in Brazil, Russia, India and China where more Gen Y employees make up the workforce.
The Gartner survey was carried out over October and November last year asking 938 respondents from Australia, the US, the UK, Germany, Brazil, Russia, India, China and Japan about their approach toward managing the impact of mobile devices on network performance and data centre infrastructure.
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.