Why BYOD represents evolution not revolution

Is BYOD necessarily the panacea that some suggests? We explore the disconnect between the theory and reality.

"You still need a helpdesk to answer all the queries and fix all the issues," says Henrys.

Different devices add yet another layer of complexity. While creating virtual infrastructure to develop a "cloud-based" desktop may overcome this problem, that in itself adds costs to the bottom line. Indeed, even a virtual infrastructure needs to be implemented and maintained by the IT department. Sometimes this can be running alongside the normal infrastructure, doubling up on support costs for the IT organisation. It doesn't make economical or common sense.

While building an infrastructure to cope with a variety of devices accessing the network is one thing, privacy and security is quite another, warns Henrys.

Grey areas

Allowing the user to bring their own device into the corporate network will mean that device will contain a mixture of personal and corporate data. While a user storing personal data on corporate machines is nothing new, there will inevitably be problems around security when corporate data is stored on personal devices.

You still need a helpdesk to answer all the queries and fix all the issues.

"What rights do the company have to that data when the employee leaves?" questions Henrys. He says that there are a lot of HR and privacy laws yet to be formulated around this issue.

Also, one big issue that could take the romance and excitement out of an employee wanting to use their own device for work is what can happen if/when that device is lost. The organisation has to take steps to ensure any confidential information is not compromised and this generally means carrying out a remote wipe of data on that device. For the user, this could also mean that precious personal data is wiped out at the same time. Suddenly, along with the data, the user's romance with BYOD is dead.

Henrys thinks the way out of this is for the IT organisation to provide business devices with consumer features that the users want. Windows 8 being a great example of such flexibility offered to businesses and users alike. It still allows the IT organisation to maintain control of the devices but the user has a device that can be a tablet when it needs to be or can convert to an ultrabook for other purposes.

But while keeping everything within a Microsoft environment where Windows devices can join the network and be controlled by IT appears the best solution, some workers may still want to use their iPhones, Android devices and iPads. So this appetite for variety must be factored in at the planning and delivery stages.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Most Popular

46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
Huawei Mate 40 Pro 5G review: A tragically brilliant Mate
Mobile Phones

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate

26 Nov 2020