Jack Gold: Has BYOD peaked?
Expect enterprises to start instituting stricter policies to make BYOD a more secure and cost-effective policy
Computerworld - It is now the majority of enterprises that have adopted bring-your-own-device, or BYOD, policies, at least for certain classes of workers within the overall population, according to our recent research.
But BYOD is not without its challenges (including data security, device manageability, support, apps and TCO), and I expect significant adjustments to BYOD policies at many organizations. Indeed, I expect the trend to plateau in the next year or two as enterprises decide that any benefits of unlimited BYOD do not warrant the anarchy and increased support costs it has often caused.
BYOD isn't going to die. But companies are starting to realize that a laissez-faire approach is not sustainable and that more controls and a better strategy are needed. Today, only 21% of companies in our Enterprise Mobility Study have a mobile strategy in place, leaving the rest with a hodgepodge of procedures that are often costly and inconsistent.
In the same study, 42% of enterprises said that they have never had a mobile security breach (across all mobile platforms: smartphones, tablets, laptops). But in my opinion, that is just blissful ignorance. In truth, large numbers of users admit to having lost devices and/or moved corporate data to nonsecure places (such as personal email or Dropbox). Furthermore, most BYOD users actually believe they are not risking corporate information assets when using their devices without enhanced security, yet many admit that they store sensitive data on their devices (or access it through cloud storage) in an unprotected state. This is a clear security risk, especially for companies in regulated industries such as financial services and healthcare.
The rush to accommodate BYOD created a substantial market for mobile device management (MDM) vendors. Most are still fairly small, but the major infrastructure players now view MDM and its derivatives as important components of their overall offerings. That is why Citrix recently moved to acquire Zenprise, why SAP acquired Sybase and its Afaria product, why Symantec acquired Nukona and Odyssey, why McAfee acquired Trust Digital, etc. I expect the market for stand-alone MDM/mobile application management vendors to slowly fade away as major infrastructure vendors like Cisco and Oracle acquire and deploy the technology, and the few remaining big MDM players (e.g., MobileIron, Airwatch) will likely be acquired too (although their valuations are quite lofty) or will consolidate with some of the smaller vendors in the market to create a sustainable niche.
Going forward, I predict that employees who bring their own devices to work will see companies impose more constraints. Furthermore, I expect two significant trends to emerge. The first is that companies will demand and get more control over devices through stricter policy enactment and enforcement, including requiring users to add third-party security and management apps to their devices that separate work apps, data and interactions from their personal counterparts. The second is that devices, especially those that are Android-based, will become inherently more enterprise-friendly. There will be more specific enterprise-targeted features and hooks built into Android over the next couple of years, similar to what's already baked into BlackBerry. Apple will likely do less in providing the heavy-duty enterprise features that some big companies want. And BlackBerry will try to win back customers based on its security and manageability features while extending them to competing platforms such as iOS and Android. Even Microsoft will jump in, pushing some of the business-oriented features in Windows 8 and emphasizing its close working relationship with Exchange ActiveSync as a way to secure mobile devices within a BYOD environment.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Securing the enterprise workspace: protect your organization while supporting mobility and BYOD This white paper explains how Dell Mobility Solutions for security can help protect your organization's data, simplify administration and support forward-thinking mobility initiatives.
- Enabling devices and device management for your mobility/BYOD program In this white paper, learn how to select the right mobile devices for your organization and manage them with efficiency, flexibility and security...
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Leveraging Flash Storage to Accelerate Oracle Real Application Clusters Join this webinar to understand the latest solid-state storage trends, the specific applications driving solid-state storage deployments and the benefits of deploying the... All Bring Your Own Device (BYOD) White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!