Intel employees prefer to choose their own devices
- 30 July, 2012 17:35
The vast majority of employees would rather choose their own enterprise device than bring their own device to work, according to an internal study by Intel.
In a survey of 2,545 employees by Intel IT, 72 percent said that they would be interested in BYOD (bring your own device) only if Intel contributed to the cost. Meanwhile, just four percent said they would prefer to bring their own computer to work, whether or not Intel pays for it.
"Employees today aren't making the preference around OS, but they are very much wanting to see more consumer-type operating systems," said Stuart Dommett, business development manager at Intel. "They're looking much more for Intel IT to provide them with something that meets those expectations, but is managed and provided to them."
The survey also found that the greatest perceived benefit of BYOD is the fact that there is a faster refresh cycle, so employees can upgrade to the lastest systems more quickly.
Other benefits cited included more choice than IT normally offers, the ability to choose a specific brand and the ability to have one machine for both home and work use.
However, Dommett highlighted that tension still remains between users and IT departments. End users want freedom and flexibility, whereas the IT professionals want controlled network access, guaranteed data security and predictable configurations.
"We have to recognise that consumer class devices don't always provide the best connectivity," he said. "It has to be robust. It's about making it connect and work with the existing infrastructure."
Intel's figures back up findings by Vodafone Global Enterprise, that some organisations are now adopting a "choose-your-own-device" (CYOD) strategy, meaning that the company supports a limited range of devices and employees can make a choice from within that catalogue.
According to IDC analyst Mike Cansfield, many people are still very distrustful of BYOD, because they do not want business to encroach on their personal lives. This is particularly true among older employees, who are less attuned to new flexible and collaborative ways of working.
Data released recently by Zscaler ThreatlabZ, the research arm of SaaS security provider Zscaler, revealed that Apple iOS has surpassed Google Android in BYOD enterprise usage, due in part to rising consumer use of iPhones and iPads
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one another. These validated architectures are ready for production environments upon delivery, and offer a single point of support should IT require it. Learn more on how a leading IT vendor has aligned product innovation with an IT market need to improve efficiency, performance, and value for SMBs.
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.