BYOD Is In – Bring Your Own Cloud, Not So Much

BYOD Is In – Bring Your Own Cloud, Not So Much

Bring Your Own Cloud

As employees continue to bring personal mobile devices and laptops into the workplace, most businesses have resigned themselves to dealing with the security and management headaches of the new BYOD reality. But now, with the growing popularity of cloud storage and synchronization services, companies have found themselves facing the next wave in the consumerization of IT: “Bring your own cloud” or BYOC.

In large part due to the flexibility of cloud collaboration services, it’s not uncommon for employees to telecommute from home or from one office to another. Many of these employees back up the entire contents of their computers with services like Carbonite or sync their data between computers with services such as Dropbox or SkyDrive. The practice may seem harmless, but it’s a data management and security headache for IT administrators.

IBM recently banned its employees from using iCloud and Dropbox on any device containing company data, and it’s far from the first. IT managers of companies dealing in significant amounts of confidential and proprietary data can’t do their jobs unless they can control data security and leakage. Employees who share their data with cloud storage services put that information outside the company firewall and beyond the IT department’s visibility. Users who lack tech savvy may even put data at risk of being unintentionally modified or deleted by misconfiguring a cloud app’s file sync settings.

In response to IT professionals’ frustration with the unauthorized use of personal cloud services, Spiceworks—a social network of over two million IT professionals—released a new version of its network analysis tool (Spiceworks 6.0) that can detect over 40 different cloud services running on a network. The tool, which seems to be the first of its kind in public release, identifies all of the cloud services running across a network and which devices they’re running on. The tool’s creation was in direction response to the Spiceworks community’s frustration with the growing BYOC trend.

Corporate executives are also waking up to the reality of BYOC risks at the enterprise level. A recent survey by Forrester found that only 36% of organizations currently have policies in place regarding public cloud storage services, but Forrester analysts expect that number to grow dramatically over the next year.

One of the most common responses to the BYOC phenomenon is for companies to foist a single centrally managed cloud service on their employees. Google Apps and Office 365, for example, have experienced strong growth in the SMB sector, and Box tripled their enterprise cloud storage revenue in 2011. All three services now integrate central data management and strong security features.

As IT administrators fight back against the consumerization of IT—at least when it comes to company data—the future may see a wave of new centrally managed cloud storage services. In a preface to a potentially much larger movement, Google surprised many of its Google Apps resellers by recently announcing that Google Apps administrators will be able to administer their users’ Google Drive accounts. If Google’s willing to do it, then who isn’t?

By Joseph Walker

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…