SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
BYOD is Here to Stay

Gartner considers consumerization of IT to be the single most influential technological trend of this
decade. Consumer technologies that include tablets, iPhones, iPads, smartphones, Facebook, and
Twitter have slowly started treading their unending journey to the IT sector. This movement is inevitable
due to the influx of breakthrough ideas and innovative products in the consumer technology arena. With
people increasingly embracing these latest innovations and getting used to its presence in their personal
lives, it is becoming increasingly difficult for them to manage work with outdated gadgets and devices.
Their greatest concern is that they use the most modern technology and powerful devices at home while
at office they have to work with obsolete gadgets. This greatly affects their productivity.


There are two ways to address this problem. Enterprises can increase employee productivity by
purchasing latest computing equipments for them. However, such a move can prove costly for the
companies, as it would increase their expenses sky high. This is because employees prefer to work with
devices that they are most comfortable with and not all employees have the same preferences. Moreover,
with technology changing every day companies would have a hard time in keeping pace with rapid
changes on the technology front. Hence, when considering all these aspects, IT provisioning would
definitely be a bad move.


The second option, which is gaining popularity among employees, is Bring Your Own Device (BYOD).
BYOD is the result of consumerization of IT. Wikipedia describes BYOD as the trend of bringing
personally owned mobile devices to the place of work and using those devices to access privileged
company resources such as email, file servers, and databases.


Though the corporate sector is divided as to whether allow employees to use their own devices for work
considering the security aspects, the BYOD trend is catching on as more and more employees are using
personally owned devices for work related purposes without consent. However, implementing BYOD
programs at workplace bring in immense benefits for companies as well as its employees. For companies
BYOD translates into reduced expenses. They need not spend dollars neither for IT provisioning nor for
maintenance. In return, the companies get increased productivity and efficiency from their employees. On
the other hand, BYOD helps employees to save time and effort as they get to work with the most modern
and powerful technologies. This not only helps them to get their work done quickly and efficiently but also
provides them the flexibility to work anytime, anywhere.


BYOD is here to stay and there is nothing that the enterprises can do but to get accustomed to it.
However, they need to bring a balance between freedom and control so that it does not threaten security.


Also read on - Appliance-Based Remote Desktop, RDP Access

Contenu connexe

En vedette (7)

Ej. 2. sint. prep. i
Ej. 2.  sint. prep. iEj. 2.  sint. prep. i
Ej. 2. sint. prep. i
 
16 July newsletter
16 July newsletter16 July newsletter
16 July newsletter
 
Prueba traducción
Prueba traducciónPrueba traducción
Prueba traducción
 
Shooting Schedule v2
Shooting Schedule v2Shooting Schedule v2
Shooting Schedule v2
 
Monitor Model Theory
Monitor Model Theory Monitor Model Theory
Monitor Model Theory
 
PROGRAMMATIC I/O 2015 - "Putting Facebook’s People-Based Marketing to the Test"
PROGRAMMATIC I/O 2015 - "Putting Facebook’s People-Based Marketing to the Test"PROGRAMMATIC I/O 2015 - "Putting Facebook’s People-Based Marketing to the Test"
PROGRAMMATIC I/O 2015 - "Putting Facebook’s People-Based Marketing to the Test"
 
Open Source Kreislaufwirtschaft & Kreislaufstadt - Innovative Citizen Festiva...
Open Source Kreislaufwirtschaft & Kreislaufstadt - Innovative Citizen Festiva...Open Source Kreislaufwirtschaft & Kreislaufstadt - Innovative Citizen Festiva...
Open Source Kreislaufwirtschaft & Kreislaufstadt - Innovative Citizen Festiva...
 

Plus de Array Networks

Plus de Array Networks (20)

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks
 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

BYOD is Here to Stay

  • 1. BYOD is Here to Stay Gartner considers consumerization of IT to be the single most influential technological trend of this decade. Consumer technologies that include tablets, iPhones, iPads, smartphones, Facebook, and Twitter have slowly started treading their unending journey to the IT sector. This movement is inevitable due to the influx of breakthrough ideas and innovative products in the consumer technology arena. With people increasingly embracing these latest innovations and getting used to its presence in their personal lives, it is becoming increasingly difficult for them to manage work with outdated gadgets and devices. Their greatest concern is that they use the most modern technology and powerful devices at home while at office they have to work with obsolete gadgets. This greatly affects their productivity. There are two ways to address this problem. Enterprises can increase employee productivity by purchasing latest computing equipments for them. However, such a move can prove costly for the companies, as it would increase their expenses sky high. This is because employees prefer to work with devices that they are most comfortable with and not all employees have the same preferences. Moreover, with technology changing every day companies would have a hard time in keeping pace with rapid changes on the technology front. Hence, when considering all these aspects, IT provisioning would definitely be a bad move. The second option, which is gaining popularity among employees, is Bring Your Own Device (BYOD). BYOD is the result of consumerization of IT. Wikipedia describes BYOD as the trend of bringing personally owned mobile devices to the place of work and using those devices to access privileged company resources such as email, file servers, and databases. Though the corporate sector is divided as to whether allow employees to use their own devices for work considering the security aspects, the BYOD trend is catching on as more and more employees are using personally owned devices for work related purposes without consent. However, implementing BYOD programs at workplace bring in immense benefits for companies as well as its employees. For companies BYOD translates into reduced expenses. They need not spend dollars neither for IT provisioning nor for maintenance. In return, the companies get increased productivity and efficiency from their employees. On the other hand, BYOD helps employees to save time and effort as they get to work with the most modern and powerful technologies. This not only helps them to get their work done quickly and efficiently but also provides them the flexibility to work anytime, anywhere. BYOD is here to stay and there is nothing that the enterprises can do but to get accustomed to it. However, they need to bring a balance between freedom and control so that it does not threaten security. Also read on - Appliance-Based Remote Desktop, RDP Access