BYOD, or else. Companies will soon require that workers use their own smartphone on the job
Security remains the main BYOD concern, but CIOs seen ready to create strategies that keep companies safe
Computerworld - Bring-your-own-device strategies are the single most radical change to the economics and culture of client computing in a decade, according to a new study by Gartner.
One radical change BYOD is expected to spawn: By 2017, half of all employers will require workers to supply their own devices for work purposes. Also, Gartner says, enterprises that offer only corporately-owned smartphones or stipends to buy your own will soon become the exception to the rule.
As enterprise BYOD programs proliferate, 38% of companies expect to stop providing devices to workers by 2016 and let them use their own, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs.
BYOD adoption currently varies widely.
Companies in the United States are twice as likely to allow BYOD as those in Europe, where BYOD has the lowest adoption of all the regions. In contrast, employees in India, China and Brazil are most likely to be using a personal device, typically a standard mobile phone, at work, according to Gartner.
The study also states that by 2015, the number of employees using mobile applications in the workplace will double. Today, roughly half of BYOD programs provide partial reimbursement.
Gartner believes that with mass-market adoption of BYOD and the steady decline in carrier fees, employers will gradually reduce subsidies. And as the number of workers using a mobile device expands, those who receive a subsidy will decline, according to David Willis, a distinguished analyst at Gartner.
"The enterprise should subsidize only the service plan on a smartphone," Willis said in a statement. "What happens if you buy a device for an employee and they leave the job a month later? How are you going to settle up? Better to keep it simple. The employee owns the device, and the company helps to cover usage costs."
At the same time, employers recognize the benefits of BYOD, such as new mobile workforce opportunities, better employee satisfaction, and reducing or avoiding costs.
Gartner defines a BYOD plan as an alternative strategy that allows employees, business partners and others to use a personally selected and purchased client device to execute enterprise applications and access data. BYOD typically includes smartphones and tablets, but the strategy may also be used for PCs. It may or may not include a subsidy.
Security is the top BYOD concern, according to the Gartner study.
The risk of data leaks on mobile platforms is particularly acute today. Some mobile devices are designed to share data in the cloud and have no general-purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.
Consumerization of IT
- There's still a security disconnect on BYOD
- Why CIOs Shouldn't Block Rogue Cloud Apps
- Field Notes: 'Rogue' employees want IT to lighten up already
- IT shops losing control over technology
- Consumerization of IT in the enterprise starting to pay off
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Securing the enterprise workspace: protect your organization while supporting mobility and BYOD This white paper explains how Dell Mobility Solutions for security can help protect your organization's data, simplify administration and support forward-thinking mobility initiatives.
- Enabling devices and device management for your mobility/BYOD program In this white paper, learn how to select the right mobile devices for your organization and manage them with efficiency, flexibility and security...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Bring Your Own Device (BYOD) White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!