BYOC – To Be Or Not To Be

BYOC – To Be Or Not To Be

BYOC – To Be Or Not To Be

I suppose that most CEOs and CIOs have been hoping that the consumerization of information technologies won’t go further than BYOD policy. Clients and employees have brought their devices in the offices, CIOs have introduced MDM-solutions (master data management) and have established the rules for using private and corporate smartphones and tablets. So it looks like the situation has been managed.BYOD: How IT Departments Deal with BYOD

Infographic Source: Comms-care
But the most important thing about consumerization is that it turned the IT industry by 180 degrees. Previously, all decisions were initiated by the board of directors, heads and chiefs. But now clients and employees choose the devices that like to work with, and very often these are personal devices rather than corporate ones.

So it’s no wonder that after BYOD there appeared a new trend called BYOC (Bring Your Own Cloud). It means that employees prefer to use their personal cloud accounts for working purposes. What is more, these accounts are really hard to control. You can’t simply prohibit using this or that cloud service as there’re dozens of them.

BYOD-InfographicWell, some people may say that it’s really a problem, let employees use whatever service they like and just accept it. But the problem is that some of the corporate documents may leak into the global network and it may happen accidentally, without any intentions. Surely, it may be a protected private account, but at the same time it may synchronize with another one, and the problems will still be there.

Another possible way out is to sign an agreement with some vendor or to buy a business version of a cloud service. But there other problems, like license agreement. What is more, there’re some problems with usability. For example, Evernote offers two types of account: private and corporate (Evernote Business), and the data for these two accounts are kept in different repositories but the interface is the same for both of them and the probability of a user mixing them up is quite high. Some cloud vendors, like Microsoft, have already started working in this direction.

But surely not all cloud vendors will create separate types of accounts for private and corporate clients. I think it’s time to concentrate on the protection of the data themselves rather than worrying about where these data are kept.

So it’s up to the company what position to take, but I think that’s it’s not the last thing we see from the consumerization and no one knows what will be brought to the office next.

By Eugene Rudenko

Eugene is a marketing manager for Oxagile, software development company offering custom SaaS solutions development for all types of businesses. Follow them in Twitter @Oxagile.

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…