2. Introduction
What is BYOD?
Bring your own device (BYOD) is an alternative strategy allowing
employees, business partners and other users to utilize a personally
selected and purchased client device to execute enterprise applications
and access data.
First entered in 2009, as organizations started recognizing an increasing
tendency among its employees to bring their own devices to work and
connect them to the corporate network.
Formal BYOD programs are a relatively new but fast-growing phenomenon.
The rapid proliferation of employees mobile devices is changing the
traditional IT environment in enterprises.
3. Dextop, 18%
Laptop, 33%
Smartphone,
Ultraportable,
Netbook, 7%
26%
Tablet, 11%
5%
Sales
Dextop
Laptop
Netbook
One in four devices used for work are
either smartphones or tablets
4. There is no stopping BYOD
The BYOD market will increase to
$181 billion by 2017.
(Marketsandmarkets)
95% of organisation permit
employee-owned devices.(CISCI
IBSG)
71% require technology that
enables their staff to work
anywhere at any time.(Microsoft)
70% of employees use personal
devices for business use.
(Forrester)
5. WHY BYOD ?
FLEXIBILITY
No hassle with one device to combine work and personal activities.
EFFICIENCY
Can get more work done with their own device.
COST REDUCTION
Annual benefits from BYOD range from $300-$1300 per employee.
PRODUCTIVITY
53% have raised work productivity through innovative practices enabled by
their devices.
EMPLOYEE SATISFACTION
Employees feel more comfortable while working on personal devices, which
improves their job satisfaction levels.
6. 9 out of 10
Employees
don’t use
password
security on
their
devices
51%
Have had
loss due to
insecure
devices
81%
Admit
accessing
their
employer’s
network
without
their
employer’s
knowledge
or
permission
46%
Who use a
personal
device for
work have
let
someone
else use it
66%
Who use a
personal
device for
work say
that their
organizati
on doesn’t
have
BYOD
policy
BRING YOUR OWN DISASTER
7. Multi-layered security technologies
File
Storage
Network
Pretty Good Privacy
Information Rights
Management
Full Disk Encryption
Database Encryption
Data Loss Prevention
Firewall
Virtual Private
Network
8. Network-centric Solutions
Firewall
Protects the (eroded) perimeter
DLP(Data Loss Prevention)
Monitoring
Good to understand where data is going
Problem is wealth of information it produces
VPN(Virtual Private Network)
Protects data in transit only
9. MDM-Mobile Device Management
Software that secures, monitors, manages and supports
mobile devices.
Over-the-air distribution of applications, data and
configuration settings.
Supports company-owned and employee-owned devices.
Addresses the limitations of Microsoft ActiveSync.
Comprehensive visibility and control over iPhones, iPads,
Androids and other popular devices with a scalable mobile
device management software solution.
10. CONCLUSION
Employee attitudes to work-life balance and single device usage
drive high levels of BYOD in high-growth markets
Instead of denying access citing the security concerns, it would be
best in business interest to embrace this business policy which
allows people to be more productive in longer run.
IT departments must find the right way to manage this behaviour.