The hidden costs of BYOD
- 05 June, 2012 14:34
Before plunging straight into bring-your-own-device (BYOD), it is important to be aware of some of the unforeseen costs associated with managing and running BYOD schemes.
“There are a lot of back-end costs which is borne by the enterprise and who owns the handset/device,” says Gartner vice-president and research director in CIO & Executive Leadership Research Team, Andy Rowsell-Jones.
“The devices themselves are relatively inexpensive and free if you get them from the telco. But nevertheless, there are some other costs for support and so on. Things like managed diversity and a proper set of policies – both human policies and technology policies – can go some ways towards addressing.”
Other costs can be telecommunications charges, licence fees, specialist technology fees, additional hardware charges and mobile device management software costs, says Rowsell-Jones.
The real cost is in device support, Rowsell-Jones says. Demands on the help desk to offer support to staff when their devices need fixing, especially if there are a wide variety of devices, can become “extremely hard” to manage.
Rowsell-Jones also points out that even though BYOD may reduce costs for some organisations, the organisation still has to pay for the infrastructure to support the devices.
“It’s not hugely cheaper to allow and support BYOD, especially with smartphones and tablets,” he says.
“Sometimes the purchase of the device itself is not a capital acquisition, but putting in Wi-Fi access points, and security software, and thick wires and thick pipes to carry all the data is. And that remains whether the device is wholly owned by the employee or wholly owned by the enterprise. So the way you think about it is, 'What’s the true differential cost saving?' and a lot of the infrastructure stuff is the same. The corporation has to pay for that, it’s not the employee.”
Another cost is the recovery or replacement of important corporate data if it is lost. "If one of these devices is compromised and loses its corporate data or is lost with lots of embarrassing data on it, [then] the problem of recovering that data can be quite expensive.”
Rowsell-Jones believes that, regardless of any associated costs, BYOD is inevitable.
“I don’t think CIOs have a choice. I think it’s one of those unstoppable social trends like social media that you can say ‘no, no, no’ and it will just happen anyway…
“You might as well embrace this thing and prepare for it because what you don’t want is to go through the same situations we went through in 2005-2006 where the BlackBerry really started to take off in enterprises and there was this fire drill that many CIOs in Australia, as well as elsewhere, needed to go through suddenly scrambling to build the servers and find ways of importing their email systems onto the BlackBerry.”
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Download the CIO Australia iPad app CIO Australia for iPad
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Six Reasons to Empower Your SharePoint Citizen Developers
- Cloud Computing for Midsize Businesses: Delivering Innovation and Efficiency
- Information Security, Virtualisation, and the Journey to the Cloud
- Data Centre Operational Efficiency Best Practices
- Why Encrypt? - Securing email without compromising communications
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.
Unleashing the Power of Information
If business-relevant information is not well managed, secured and analysed, it can become an underutilized asset or—worst case—a legal and competitive liability. Nearly all of the IT and business executives who responded to a recent survey recognise this risk, and say they understand the importance of having an enterprise information management (EIM) strategy. Find out more on how to reduce costs, improve competitiveness and avoid risk by making information management an enterprisewide strategic priority.