Business of IT: Building a case for BYOD

The consumerisation of IT is upon us and business and technology decision makers must now decide whether they are for or against BYOD. Stephen Pritchard considers the options.

And as well as protecting data, companies also need to pay attention to how personal devices are managed.

Colt, for example, does not install any company software or drivers on employees' personal machines, relying instead on its virtual desktop environment. But in other cases companies might need to ask for the right to wipe a lost phone, or put in place other restrictions on its use.

"Personal devices open up a couple of new issues for IT organisations," cautions Nicko van Someren, CTO at mobile device management vendor Good Technology. There is a much wider variety of personal devices in the field than you would ever have if it were corporate devices as everyone has different tastes. And you have to have ways of separating out the business data from the personal data. The enterprise needs to have control over that business data, but should not have control over personal information."

The most difficult part of a BYOD programme, though, might not be controlling data but building a business case for the moves. BYOD is usually positioned as a cost-saving measure, but doing it properly with the right security and data protection policies and steps to ensure compatibility is not cheap.

Advertisement
Advertisement - Article continues below

"It is almost always possible to solve the technical challenges, but it is not possible to build a business case for BYOD on its own," says Colt's Hewertson. "We supported it by reducing hardware costs, reducing hardware support, avoiding a hardware refresh cycle and changes in how people work. It has to be part of a bigger picture."

If you're interested in finding out more about the future of enterprise mobile computing and want to get advice, insight and thought leadership on how to maximise BYOD in your organisation, look no further than this webcast.

CLICK TO REGISTER NOW

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019