Recent Trends In BYOD Have Businesses Leaping Towards Wrong Decisions
As I have been discussing BYOD (Bring Your Own Device) for some time now, some of you might already be familiar with it. For those who are not, BYOD as the name suggests, is about bringing your own personal devices for work use, as opposed to employing a company issued device. This usually refers to mobile devices like laptops, tablets and smart phones; I doubt anyone would bring their home desktop to work. To cut it short, BYOD is going to give some corporate IT officers headaches in the future as they are driven to make some over zealous decisions now.
Many CIO’s and IT administrators might not have realized that they have made some wrong decisions. What I am talking about is the recent surge in the number of companies quickly adapting BYOD policies because it is seen as a perk that will help appease the employee population and entice potential employees. That is not bad at all as BYOD is expected to add to employee satisfaction and productivity and is an essential component for work-shifting. The problem lies with how companies are approaching it –like a band aid solution. They are trying to implement it quickly that they are considering using cheap and lightweight device management solutions or web-based tools in order to control these devices and add a measure of security and management. This is all well and good in the beginning, but it isn’t until they try to develop or implement apps into those devices that problems start cropping up everywhere.
BYOD is merely a name and does not dictate the method of implementation. Just because, it refers to devices does not mean that we have to concentrate on the device. New devices are being released very quickly and people are replacing their devices just as fast. It will simply be a hassle to secure the device itself, it would be easier to secure and maintain the mobile app so that it will be usable in any device without really doing anything to the device itself.
Mobile device management (MDM) experts agree that the future for enterprise mobility management (EMM) lay with mobile application management (MAM). You need to secure the application, even make it cross-platform so that no matter what kind of device, it is still usable. The employee does not have to sign any confidentiality agreement involving the device, and IT does not need to wipe the device or do more than simple tweaking of settings. It should be as non-invasive as possible.
By Abdul Salam
- Green Technology And The Cloud Industry - June 29, 2015
- Passing Big Data Through A Drinking Straw - October 22, 2013
- Cloud Computing Bottleneck: The Bandwidth Problem - October 17, 2013
- The Compromise For Internal And External IT - September 23, 2013
- Potential Powerful Pitfalls – Big Data, Big Trouble - September 10, 2013