Supplementing A Cloud ERP System With BYOD

Supplementing a Cloud ERP System with BYOD

There’s been a lot of press recently about businesses using a “bring your own device” (BYOD) policy as a means of increasing IT access and habitual usage of business process software. BYOD can potentially allow your employees to access your cloud ERP application and company records anywhere in the world. In fact, researchers predict that tens of millions of users will be using ERP and CRM applications on mobile devices by 2017.

Why Consider BYOD?

One of the reasons BYOD works so well with cloud ERP systems is that it allows you to really maximize the benefits of the technology. Many companies implement a cloud ERP system, but then find that their employees don’t use it as much as they could. If your business implements a BYOD policy, employees can connect to the company’s ERP system using devices that they are already familiar with and have in hand.

Get the Most from Your Cloud ERP Solution

By remotely connecting to your cloud ERP application, your employees’ smartphones or tablets become company dashboards to access just about anything. Salespeople can examine the contents of your inventory and order products right from a meeting with a client. Managers can access records and process information at home with a sick child or on a business trip. Remote access is a boon to road warriors, telecommuters, and warehouse managers who aren’t near a terminal. Using mobile devices helps your employees to use the cloud ERP solution habitually. And as more and more employees use it more frequently, the ERP system becomes more powerful. But would BYOD be a good fit for your particular company? Here are a few factors to consider:

Controlling IT Costs: While it is not the most critical benefit, for many small businesses a BYOD policy can greatly expand their IT capacity.  If your employees can access company information from their own smart phones, tablets, and computers, you get the benefit without the upfront cost.

Accessibility:  If each employee brings his or her device, you need to make sure your ERP system works with it. Cloud ERP systems are web-based, so there is no compatibility problem; you can use a smartphone or tablet the same way you would use a desktop or laptop computer. Before settling on a solution, be sure you understand how the interface works and how easily it can be accessed remotely.

Adoption and habitual usage are key to any successful ERP implementation. With BYOD, employees (especially road warriors) can quickly update information instead of waiting to come back to the office. And the convenience of personal devices now blur the line of work and play. Even someone vacationing at a resort can quickly and easily gain access to their cloud ERP system with just a smartphone.

Security: Security is always a concern with IT. Just as with any IT application, with BYOD you need to balance accessibility and security concerns. If your business issues computers and other devices, you can require certain security measures. Such policies are harder to enforce when the employee owns the hardware; however, you should at least insist that sensitive data is protected by a password.

So is a BYOD policy right for your business? Researchers have found that some companies which could benefit from BYOD do not always exploit it to its full potential. Of the small and mid-sized businesses that could benefit from a BYOD policy, only one-tenth of them use it exclusively. Whether or not it’s right for your company depends on a variety of factors, including the size of your business and the amount of sensitive data you use. While some companies may be better off supplying devices so they can control and secure them, others – particularly small businesses – may greatly expand their technological capacity and employee usage if they implement a BYOD policy. If you are deciding on such a policy, it is also essential to talk with your ERP vendor. They can help you figure out the right way to make your information accessible while keeping it safe.

By Douglas Johnson,

Douglas Johnson has over 20 years of experience in the software industry and currently works as the VP of Marketing and Business Development at cloud ERP software provider Acumatica.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…