BYOD Is In – Bring Your Own Cloud, Not So Much

BYOD Is In – Bring Your Own Cloud, Not So Much

Bring Your Own Cloud

As employees continue to bring personal mobile devices and laptops into the workplace, most businesses have resigned themselves to dealing with the security and management headaches of the new BYOD reality. But now, with the growing popularity of cloud storage and synchronization services, companies have found themselves facing the next wave in the consumerization of IT: “Bring your own cloud” or BYOC.

In large part due to the flexibility of cloud collaboration services, it’s not uncommon for employees to telecommute from home or from one office to another. Many of these employees back up the entire contents of their computers with services like Carbonite or sync their data between computers with services such as Dropbox or SkyDrive. The practice may seem harmless, but it’s a data management and security headache for IT administrators.

IBM recently banned its employees from using iCloud and Dropbox on any device containing company data, and it’s far from the first. IT managers of companies dealing in significant amounts of confidential and proprietary data can’t do their jobs unless they can control data security and leakage. Employees who share their data with cloud storage services put that information outside the company firewall and beyond the IT department’s visibility. Users who lack tech savvy may even put data at risk of being unintentionally modified or deleted by misconfiguring a cloud app’s file sync settings.

In response to IT professionals’ frustration with the unauthorized use of personal cloud services, Spiceworks—a social network of over two million IT professionals—released a new version of its network analysis tool (Spiceworks 6.0) that can detect over 40 different cloud services running on a network. The tool, which seems to be the first of its kind in public release, identifies all of the cloud services running across a network and which devices they’re running on. The tool’s creation was in direction response to the Spiceworks community’s frustration with the growing BYOC trend.

Corporate executives are also waking up to the reality of BYOC risks at the enterprise level. A recent survey by Forrester found that only 36% of organizations currently have policies in place regarding public cloud storage services, but Forrester analysts expect that number to grow dramatically over the next year.

One of the most common responses to the BYOC phenomenon is for companies to foist a single centrally managed cloud service on their employees. Google Apps and Office 365, for example, have experienced strong growth in the SMB sector, and Box tripled their enterprise cloud storage revenue in 2011. All three services now integrate central data management and strong security features.

As IT administrators fight back against the consumerization of IT—at least when it comes to company data—the future may see a wave of new centrally managed cloud storage services. In a preface to a potentially much larger movement, Google surprised many of its Google Apps resellers by recently announcing that Google Apps administrators will be able to administer their users’ Google Drive accounts. If Google’s willing to do it, then who isn’t?

By Joseph Walker

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

The Internet of Things – Redefining The Digital World As We Know It

The Internet of Things – Redefining The Digital World As We Know It

Redefining The Digital World According to Internet World Stats (June 30th, 2015), no fewer than 3.2 billion people across the world now use the internet in one way or another. This means an incredible amount of data sharing through the utilization of API’s, Cloud platforms and inevitably the world of connected Things. The Internet of Things is a…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by 10-20%. This infographic provided…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…