If you have not noticed, there is a trend now hyping now pulling wave in the business world its called Bring Your Own Device, though some people might substitute that "Device" to many from "Technology" "Software" "App" "Computer" "Cloud" so you might see BYOD been interchanged with BYOT, BYOS, BYOA, BYOC and BYOC; it all depends from which approach you get on with it.
Now lets get to the stats and try to tear it down as much as we can (ahahahahah)
Osterman Research conducted a survey of 760 individuals with regard to the BYOD issues they face in their organizations. Personally owned Apple iPhone and iPads, as well as Android smartphones and tablets, are more common than their company-supplied counterparts.
Also during this research was found an unbelievably huge use of third party, cloud-based storage and file synchronization offerings that are sometimes used with the approval of the company's IT department {meaning the IT department allows Staff to make use of such}, but more often not. Most of you have them on on your computers and even mobile versions like that of Dropbox, Skydrive, Apple Cloud and the self acclaimed Google drive and 14% of 1,000+ employee of an organizations uses it with IT's approval and blessing and in 44% of 1000+ employee uses them without approval. This is very staggering, it means that we cannot run away from the
According to Wiki, BYOD was first introduced since the year 2009, courtesy of Intel when it recognized an increasing tendency among its employees to bring their own devices to work and connect them to the corporate network. However, it was only until early 2011 before the term BYOD grabbed the much needed attention to achieved any real prominence when IT services provider Unisys, software vendors VMware and Citrix Systems started to share their perceptions of this emergent trend.
In 2012, the Equal Employment Opportunity Commission adopted a BYOD policy, but many employees continued to use their government-issued BlackBerrys because of concerns about billing, and the lack of alternative devices.
Similar term
Corporate Owned, Personally Enabled (COPE) is an IT business strategy through which an organization buys and provides computing resources and devices to be used and managed by employees. COPE allows an organization to source and deliver computing devices and services to employees and is how most organizations provide handheld or portable devices/gadgets to their employees. These devices can include but are not limited to laptops/notebooks, smartphones, tablets PCs and/or software services.
COPE is the complete opposite to bring your own device (BYOD), a strategy in which employees use their own devices for work, rather than attaining them from their employer. Businesses using a COPE strategy can provide their employees with IT devices and gadgets but the company maintains ownership of such devices, and can often monitor and control their activity to a larger degree. Besides business purposes, employees can use their devices for personal activities such as accessing social sites, email, calls, etc. Plus, COPE can be a less expensive option that BYOD, in which employees are often reimbursed for all or part of the cost of the devices they buy. This is because if the company buys devices, it can generally get them for less than retail price. COPE also gives the company more power in terms of policing and protecting devices, thus reducing some of the risk that comes with BYOD.
Looking Ahead
It is now the time the BYOD can't simply be Neglected, the education sector has thrived on this for long unknowingly even as the neglect the secured approach of it and even Intel has been forced to expand its BYOD program due to high yields on productivity. Intel has 23,500 devices and 41 applications and services in its BYOD program. there was a resounding success, providing around 5 million hours of annual productivity gains last year for the tiny devices company
"The goal is to provide a security infrastructure that does not hinder mobility
The Duo Persona Effect
I call this the 'Duo persona effect' because it applies to the Device you bring to work, you very own personal device has a split personality, your home personality which involves you and your home work, meetings with family and friends, mails from relatives of as the case may be, then the personality which involves your work, corporate data, business appointment, account information, business proceedings and as the case may be. So the challenge remains can we effectively manage the personalities in one device and not undermining information security policies cost and scalability of network?
1. Samsung's Approach [Knox SAFE]
The dozen security enhancements to the Samsung SAFE program (an abbreviation for Samsung Approved For Enterprise) which include enterprise Single Sign-On, mean that users get "security enhanced Android" to "address all major [Android] security gaps," said Timothy Wagner, general manager of enterprise sales for Samsung in a briefing with reporters.
For instance, Samsung has written more than 700 APIs (application programming interfaces) that can be used to help IT shops customize Bring Your Own Device (BYOD) security policies in partnership with existing Mobile Device Management (MDM) vendors such as Mobile Iron, Juniper, AirWatch and Sybase.
2. Blackberry's Approach [Balance]
BlackBerry recently announced Balance, which created dual personas in the BlackBerry 10 OS used in the new Z10 smartphone. But BlackBerry adds another layer of security by requiring that IT shops set up BlackBerry Enterprise Service 10 software on a server behind the corporate firewall.
The software carries a one-time fee of $99 per supported device when installed on a corporate server. A limited 60 day free trial download of the software is also available. Analyst have argued that the Blackberry's approach offers a more secured assurance than that of samsung's galaxy s3
Android is already running more than 70% of smartphones sold. Samsung sells about half of all smartphones, which puts the company in a powerful position to help workers and IT shops.
3. Cisco System's Appraoch [Cisco Jabber]
Cisco Jabber lets you access presence, instant messaging (IM), voice, video, voice messaging, desktop sharing, and conferencing. Now you can find the right people, see if and how they are available, and collaborate using your preferred method. it collaborates with existing technologies like the Cisco ASA to provide tailored security
xcdfd;vdfmdv
4. HP's Approach
HP has launched the industry’s only complete unified solution that supports growing bring-your-own-device (BYOD) initiatives. It delivers:
- Unified BYOD Essentials — Simple and secure, automated onboarding of users
- Unified Wired and Wireless network with the scalability to meet the increasing number of personal devices
- Software defined networking that can protect the network dynamically and simply
ofregfioerngoinergonergn
5. VMware's Approach [VMware Horizon Suite]
Anticipating the greater use of personal consumer electronics in the workplace, VMware has bundled three of its IT management products into a single suite designed to help administrators deliver worker data, applications and desktops to myriad end-user devices.
This Horizon Suite will provide employees the opportunity to access work applications from any device they use, whether it is a laptop, tablet or even smartphone, as said by Erik Frieberg, a senior director at VMware for end user computing.
VMware's approach is "to transform the silo apps, such as operation systems, into services that can be delivered to end users in any device, with policy-based management.
VMware Horizon
6. Microsoft's Approach [intune]
Big technology small device, The microsoft's Windows intune is a cloud service hosted by microsoft with no additional infrastructure needed this makes it an easy and cheap approach
Intunes Overview
demo od CISCO BYOD implementation
BYOD will continueto dominate in the IT sector and move upwards in trend because unlike in 2009 there is nothing stopping it right now, many companies are adapting and adopting their infrastructure to embrace the larger scheme of things some.
According to Bob Lewis of infoworld 'BYOD is more of a sourcing tactics that it is technology' and as a result might cause disruption in three major areas -- integration, information security, and support -but as it turns out as integration is not much of a problem as many platforms are now available not by very much, however, Is Information security a barrier to BYOD because despite the adaptation and adoption.
Most of your might find yourselves in a company implementing this so now you've been brought up to speed
What do you think about Bringing Your Own Device [BYOD]
Do you think it will save cost for your company?
Do you thing it will ever be as secured as the Corporately Owned, Personally Enabled [COPE]?
Would you advice your company to embrace this upward trend?
Source
0 comments:
Please leave your comment as it will help us improve