To BYO or not to BYO?
- 31 May, 2012 14:49
The BYOD (bring-your-own-device) trend seems unstoppable, especially when it comes to mobile devices. According to IDC, employee-owned smartphones will represent more than half (56 per cent) of the business smartphones shipped in 2013. Enterprises and government entities are scrambling to adapt to this reality, often not realising the full impact of employee purchased technology in the workforce.
Technology is now part of a company’s image and brand and this is shaping the BYO question for the CIO. Are we going to resist the BYO trend and insist on company-provided devices or will we embrace the shift and empower staff to use their preferred technology?
Denis O’Shea, CEO of mobile management company Mobile Mentor, discusses the main issues when considering a BYO mobile strategy.
The starting point of a good BYO program is a balanced mobile policy which represents the interests of IT, Finance, HR and the employee. At a minimum, the policy should define the user profiles, security settings, hardware support, recommended apps and spend allowances. When done properly this policy defines the rules of engagement between the employee and the company and is able to stand the test of time and inevitable changes in technology.
If employee-owned devices are connected to the company’s email, wireless or storage infrastructure or other business applications, they must be secured and managed like other devices on the company network. This was taken for granted in the good old days of company-owned BlackBerry devices but with today’s rapid influx of Apple and Android devices to the work space, IT needs to manage these devices and secure the information passing through them. The good news is that MDM (Mobile Device Management) technology is rapidly maturing allowing IT to monitor mobile devices like any other end-point on the company network and enforce appropriate security policies.
User supportSmartphones and tablets are increasingly being purchased by employees on the weekend and brought to work on Monday — with an expectation that the IT service desk can assist with configuration, connectivity and support. Unless the service desk is constantly investing in skills to support the full range of mobile devices, there will be a growing mismatch between user expectations and service. On the other hand abdicating support to the user may compromise productivity so it is important to provide enough hardware support to keep BYO users connected during work hours, including the ability to borrow a loan device when required.
Corporate plan or personal plan?
BYOD implies that employees purchase their own hardware, reducing the employer’s CAPEX. But does it also mean the mobile plan should also be purchased by the employee?
Not if you want bring your OPEX down as well. Opting for a corporate plan for BYO devices gives you a number of advantages: you can negotiate cheaper mobile rate plans without the traditional hardware subsidies factored in, still pay corporate rates rather than consumer rates, have free calling between employees and integration with landlines. None of these benefits are available to employees on a personal plan.
However, there is a critical need for improved visibility of mobile costs by the users, reimbursement of personal usage and improved analysis and management reporting.
Meet us half way
With a balanced mobile policy, MDM technology, hardware support and cost control, the CIO is empowered to answer the BYO question and say “yes, meet us half way”. “You can use your own device for work as long as you comply with the policy and we can manage your device on the network.
And by choosing the right tools or partners for device management, mobile service desk and expense management, the CIO has the full visibility of policy compliance, security, productivity and total cost of ownership.
Denis O’Shea is CEO of Mobile Mentor
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Cloud Computing for Midsize Businesses: Delivering Innovation and Efficiency
- Endpoint Protection Overview
- Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
- Leading Through Connections – Insights from the Global Chief Executive Officer Study
- 2013 Global Information Security Survey: Initial findings
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
How Web Security Improves Productivity and Compliance
In this white paper, we will look at how secure web gateways, one type of information security technology, can provide benefits to many departments within any business or government agency. Download now.
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.
Moving to a Private Cloud? Infrastructure Really Matters!
The Cloud isn’t about locality. It is about quality of service delivery, cost, and whether the services consumed satisfy our objectives. For the enterprise, you need to select the right QoS to mitigate the inherent risks or you face the problem of losing data and the ability to execute operationally. Read on.