BYOD, or else. Companies will soon require that workers use their own smartphone on the job
Security remains the main BYOD concern, but CIOs seen ready to create strategies that keep companies safe
Computerworld - Bring-your-own-device strategies are the single most radical change to the economics and culture of client computing in a decade, according to a new study by Gartner.
One radical change BYOD is expected to spawn: By 2017, half of all employers will require workers to supply their own devices for work purposes. Also, Gartner says, enterprises that offer only corporately-owned smartphones or stipends to buy your own will soon become the exception to the rule.
As enterprise BYOD programs proliferate, 38% of companies expect to stop providing devices to workers by 2016 and let them use their own, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs.
BYOD adoption currently varies widely.
Companies in the United States are twice as likely to allow BYOD as those in Europe, where BYOD has the lowest adoption of all the regions. In contrast, employees in India, China and Brazil are most likely to be using a personal device, typically a standard mobile phone, at work, according to Gartner.
The study also states that by 2015, the number of employees using mobile applications in the workplace will double. Today, roughly half of BYOD programs provide partial reimbursement.
Gartner believes that with mass-market adoption of BYOD and the steady decline in carrier fees, employers will gradually reduce subsidies. And as the number of workers using a mobile device expands, those who receive a subsidy will decline, according to David Willis, a distinguished analyst at Gartner.
"The enterprise should subsidize only the service plan on a smartphone," Willis said in a statement. "What happens if you buy a device for an employee and they leave the job a month later? How are you going to settle up? Better to keep it simple. The employee owns the device, and the company helps to cover usage costs."
At the same time, employers recognize the benefits of BYOD, such as new mobile workforce opportunities, better employee satisfaction, and reducing or avoiding costs.
Gartner defines a BYOD plan as an alternative strategy that allows employees, business partners and others to use a personally selected and purchased client device to execute enterprise applications and access data. BYOD typically includes smartphones and tablets, but the strategy may also be used for PCs. It may or may not include a subsidy.
Security is the top BYOD concern, according to the Gartner study.
The risk of data leaks on mobile platforms is particularly acute today. Some mobile devices are designed to share data in the cloud and have no general-purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.
Consumerization of IT
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- The next corporate revolution will be power to the peons
- Dual persona smartphones non grata at Starz
- Google Glass breaks into business
- BYOD, or else. Companies will soon require that workers use their own smartphone on the job
- 'Dual personality' could morph into Jekyll and Hyde for Samsung and BlackBerry
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
MDM and beyond: Rethinking mobile security in a BYOD world
Regardless of who purchased the mobile device, if it's being used for
business purposes, it needs to fall under IT's umbrella of protection.
Delivering Enterprise Information Securely on tablets & smartphones
A technical how-to guide-updated for Android 4.2,iOS 6.1, and Windows
Phone and Surface 8
- Best Practices for Making BYOD Simple and Secure BYOD goes mainstream: Formalizing consumerization-and getting it under control
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Bring Your Own Device (BYOD) White Papers | Webcasts