SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
1 www.arabbusinessreview.com 
BYOD in the Middle East 
 The rise in IT spending is fueling the increased adoption of the bring-your-own-device 
(BYOD) culture in the region, and given its inherent advantages for employees and 
employers, BYOD adoption is bound to grow further in the coming years. 
 However, BYOD adoption is accompanied by IT security risks arising out of lack of 
awareness about device security among employees. The situation is compounded by 
insufficient network resources and the lack of formal BYOD policies at organizations to 
manage security risks emanating from use of personal devices on official servers and 
networks. 
 CIOs in the region need to respond by preparing IT networks and formulating a BYOD 
policies, which are designed to manage this increased demand for BYOD and mobile 
diversity in the region. 
An Employee Engagement Tool or an IT Threat? 
 Middle East is among the fastest growing IT markets in the world, with IT spending in the 
region expected to exceed $32 billion in 2014. As per the latest IT forecast by IDC, 
spending on IT products and services in the Middle East will increase 7.3% year on year and
2 www.arabbusinessreview.com 
will cross $32 billion in 2014. Nearly 75% of this expenditure is expected to come from 
individual customers, the public sector, and the communications and financial services 
verticals. The key growth driver will be public sector investments in improving government 
services, education, and healthcare services in the GCC region. 
 The rise in IT spending is fueling the increased adoption of the bring-your-own-device 
(BYOD) culture in the region, as the increased proliferation of smartphones and tablet PCs, 
as well as increased mobility of workforces is forcing a shift in the way that companies 
operate on a day-to-day basis. A survey by Aruba Networks found out that employers in 
the Middle East were more likely to say Yes to BYOD, as compared to companies in other 
parts of the world. The study found that 70% of EMEA enterprises allowed some form 
access from personal devices, a figure backed by Cisco’s 2013 Middle East ICT Security 
which found that almost two-thirds of employees in the region are allowed to use their 
own devices to access the company server or network. 
Percentage of Companies saying Yes to BYOD across Regions 
Source: Aruba Networks 
 Given its inherent advantages for employees and employers, BYOD adoption is bound to 
grow further in the coming years. BYOD allows workers to operate on devices that they 
are comfortable working on, and in some cases from a location of their choice (e.g. home), 
thus extending flexibility in working environment. Therefore, the BYOD culture benefits
3 www.arabbusinessreview.com 
employees and bossts their motivation and engagement levels. But its benefits are not 
limited to employees are alone. Employers too stand to benefit considerably. As per Cisco 
Consulting Services estimates, the annual cost benefits of BYOD range from $300 to $1,300 
per employee, depending on the employee’s job role. In addition, happier and motivated 
employees have higher productivity, and are more likely to focus on innovation rather than 
just dealing with daily chores at workplace, thus contributing to the overall growth of the 
organization. 
 However, BYOD adoption is accompanied by IT security risks arising out of lack of 
awareness about device security among employees. The use of mobile devices like 
smartphones and tablets is expected to grow over the next few years, as the region is 
expected to have 850 million mobile users by 2017. And most of these devices will also be 
used by employees at workplace as BYOD adoption increases – this is corroborated by the 
Middle East ICT Security Study that found that nearly 64% employees are allowed to use 
their own devices to access the company server or network. However, 65% of employees 
their own devices in the workplace currently do not understand the security implications of 
using personal devices in the workplace, thereby exposing the company server or network 
to high degree of IT security risk. 
 The situation is compounded by insufficient network resources and the lack of formal 
BYOD policies at organizations to manage security risks emanating from use of personal 
devices on official servers and networks. As of 2013, only 55% companies in the Middle 
East have a plan or a formal policy to manage the use of personal devices for work related 
purposes. As a result, cyber-criminals are increasingly attacking internet infrastructure 
rather than individual computers or devices, with password and credential theft, 
infiltrations, and breaching and stealing data. Therefore, it is not surprising that businesses 
in the Middle East are facing a growing risk of cyber-attacks as per the 2014 IT Security 
Study in the Middle East.
4 www.arabbusinessreview.com 
As per the Aruba Networks survey, the IT security challenge is accompanied by insufficient 
network resources to support the influx of multimedia-rich devices, as 35% organizations 
claimed that they did not have enough wireless coverage and capacity for supporting BYOD. 
 Overall, the key challenges and concerns highlighted by businesses considering or 
implementing BYOD in the region are: 
 Securely connecting devices (especially mobile) to corporate networks 
 Avoiding an increase in IT resources and expenses 
 Ensuring wireless coverage and capacity 
 Ensuring device security 
 Establishing corporate policies and acceptable uses 
 Enforcing access rights to resources based on user, device, and app 
 CIOs in the region need to respond by preparing IT networks and formulating a BYOD 
policies, which are designed to manage this increased demand for BYOD and mobile 
diversity in the region. As a first step, CIOs need to develop IT infrastructure that is 
capable of supporting a broad array of devices without overburdening their IT staff. With 
mobile devices leading the BYOD adoption, this would mean increased investment in 
wireless infrastructure in the coming years. The requisite IT infrastructure development 
needs to be complemented by developing and implementing organization-wide BYOD 
strategy and policy. To develop an effective policy, organizations need to define and 
understand factors such as which devices and operating systems to support, security 
requirements based on employee role and designation, the level of risk they are willing to 
tolerate, and employee privacy concerns. 
The key characteristics of a good BYOD policy are: 
 Balances security requirement vs. employee experience and privacy. It is important to 
develop policies that have minimal impact on employee’s experience, while maintaining 
the required security levels. Equally important is defining and communicating the level of 
vigilance/monitoring that IT department plans to implement to monitor device usage.
5 www.arabbusinessreview.com 
Given that BYOD is an employee-driven phenomenon, a policy that is too restrictive or 
invades user privacy might prove counter-intuitive to the whole concept (and related 
benefits) of BYOD. So mapping the security requirement based on employee role is critical. 
 Supports multiple devices and operating systems: It is important for CIOs to factor-in all 
types of platforms and operating systems used by employees. While iOS is a natural choice 
due to the high level of in-built security, Windows (phone, PC, tablets) and Android (phone, 
tablets) have also gained immense popularity and can no longer be overlooked. 
 Is flexible (semi-BYOD): for organizations that have high degree of data security risk (e.g. 
financial services firms), CIOs can opt for semi-BYOD policies which allow their employees 
to use their own devices so long as they comply to a list of company-approved devices, so 
that IT departments don’t have sleepless nights over what devices their networks might 
have to accommodate. 
 Most importantly, a good BYOD strategy is focused educating employees about BYOD 
policies and ensuring compliance to alleviate related risks. It is important for 
organizations to not just develop such policies, but also provide guidance on ‘Do’s and 
Don’ts’ and best practices on using personal devices for official purpose. Conducting 
company-wide roadshows and training/counselling sessions, followed-up by online tests 
around the company’s BYOD policies is another way to driving home the message of the 
company’s seriousness about such initiatives and IT security at the same time. 
We believe designing and implementing BYOD policies is important not just for organizations 
that either adopted or are considering BYOD, but for others as well since BYOD adoption is a 
question of ‘when’ and not ‘if’ for businesses in the region. 
The article was originally published at: Arab Business Review 
To read more thought-leadership stuff by leaders from Arab Region, please visit Arab Business Review

Contenu connexe

Tendances

Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Kyriba Corporation
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 

Tendances (19)

Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Byod
ByodByod
Byod
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Ijmet 10 01_197
Ijmet 10 01_197Ijmet 10 01_197
Ijmet 10 01_197
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Product Market Study - ICT Market in Vietnam (2012)
Product Market Study - ICT Market in Vietnam (2012)Product Market Study - ICT Market in Vietnam (2012)
Product Market Study - ICT Market in Vietnam (2012)
 
Is Mobile Media strategy relevant for big corporate?
Is Mobile Media strategy relevant for big corporate?Is Mobile Media strategy relevant for big corporate?
Is Mobile Media strategy relevant for big corporate?
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 

En vedette

Flower bouquet delivery in hyderabad
Flower bouquet delivery in hyderabadFlower bouquet delivery in hyderabad
Flower bouquet delivery in hyderabadBraddon Pitt
 
Composto mercadológico
Composto mercadológicoComposto mercadológico
Composto mercadológicokalledonian
 
Avisos shalom 10 03-2013
Avisos shalom 10 03-2013Avisos shalom 10 03-2013
Avisos shalom 10 03-2013Ricardo Gondim
 
Uaf job fair
Uaf job fairUaf job fair
Uaf job fair25thbsb
 
Please Sir, No More Hardcopy Training Records: A novel example of how to imp...
Please Sir, No More Hardcopy Training Records:A novel example of how to imp...Please Sir, No More Hardcopy Training Records:A novel example of how to imp...
Please Sir, No More Hardcopy Training Records: A novel example of how to imp...Simon Hack
 
Routing High-Speed JESD204B Lanes
Routing High-Speed JESD204B LanesRouting High-Speed JESD204B Lanes
Routing High-Speed JESD204B Lanesibeavers
 
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Maurizio Bortoletti
 
Final Project Jeopardy
Final Project JeopardyFinal Project Jeopardy
Final Project Jeopardyguest41ad41
 
Clare Ntinda - The Salvation Army Chikankata Mission Hospital, Zambia
Clare Ntinda - The Salvation Army Chikankata Mission Hospital, ZambiaClare Ntinda - The Salvation Army Chikankata Mission Hospital, Zambia
Clare Ntinda - The Salvation Army Chikankata Mission Hospital, ZambiaRegional AIDS Training Network
 
Diari del 12 de novembre de 2014
Diari del 12 de novembre de 2014Diari del 12 de novembre de 2014
Diari del 12 de novembre de 2014diarimes
 
Slideshare Developing A Socially Responsible Alcohol Policy
Slideshare Developing A Socially Responsible Alcohol PolicySlideshare Developing A Socially Responsible Alcohol Policy
Slideshare Developing A Socially Responsible Alcohol PolicyElizabeth DeConti
 
Presentation.sept 17
Presentation.sept 17Presentation.sept 17
Presentation.sept 17BUZEB
 

En vedette (20)

Primera
 Primera Primera
Primera
 
Flower bouquet delivery in hyderabad
Flower bouquet delivery in hyderabadFlower bouquet delivery in hyderabad
Flower bouquet delivery in hyderabad
 
Composto mercadológico
Composto mercadológicoComposto mercadológico
Composto mercadológico
 
Avisos shalom 10 03-2013
Avisos shalom 10 03-2013Avisos shalom 10 03-2013
Avisos shalom 10 03-2013
 
Life2
Life2Life2
Life2
 
Uaf job fair
Uaf job fairUaf job fair
Uaf job fair
 
Please Sir, No More Hardcopy Training Records: A novel example of how to imp...
Please Sir, No More Hardcopy Training Records:A novel example of how to imp...Please Sir, No More Hardcopy Training Records:A novel example of how to imp...
Please Sir, No More Hardcopy Training Records: A novel example of how to imp...
 
Honors Earth Science Current Events
Honors Earth Science Current EventsHonors Earth Science Current Events
Honors Earth Science Current Events
 
Grafite
GrafiteGrafite
Grafite
 
Location And Distance On The Earth Take Home
Location And Distance On The Earth Take HomeLocation And Distance On The Earth Take Home
Location And Distance On The Earth Take Home
 
Routing High-Speed JESD204B Lanes
Routing High-Speed JESD204B LanesRouting High-Speed JESD204B Lanes
Routing High-Speed JESD204B Lanes
 
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...
Bortoletti, corruption, some interesting topics, commissione europea, ipa zag...
 
Final Project Jeopardy
Final Project JeopardyFinal Project Jeopardy
Final Project Jeopardy
 
3d scanner(physios)
3d scanner(physios)3d scanner(physios)
3d scanner(physios)
 
Clare Ntinda - The Salvation Army Chikankata Mission Hospital, Zambia
Clare Ntinda - The Salvation Army Chikankata Mission Hospital, ZambiaClare Ntinda - The Salvation Army Chikankata Mission Hospital, Zambia
Clare Ntinda - The Salvation Army Chikankata Mission Hospital, Zambia
 
Diari del 12 de novembre de 2014
Diari del 12 de novembre de 2014Diari del 12 de novembre de 2014
Diari del 12 de novembre de 2014
 
10.4.10
10.4.1010.4.10
10.4.10
 
Atms
Atms Atms
Atms
 
Slideshare Developing A Socially Responsible Alcohol Policy
Slideshare Developing A Socially Responsible Alcohol PolicySlideshare Developing A Socially Responsible Alcohol Policy
Slideshare Developing A Socially Responsible Alcohol Policy
 
Presentation.sept 17
Presentation.sept 17Presentation.sept 17
Presentation.sept 17
 

Similaire à Byod in the middle east

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy onijmnct
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxMetaorange
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 

Similaire à Byod in the middle east (20)

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 

Plus de team-abr

Can investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recoveryCan investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recoveryteam-abr
 
Higher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystemHigher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystemteam-abr
 
Time of the machines
Time of the machinesTime of the machines
Time of the machinesteam-abr
 
Addressing pilot shortage
Addressing pilot shortageAddressing pilot shortage
Addressing pilot shortageteam-abr
 
How to run an effective linked in campaign
How to run an effective linked in campaignHow to run an effective linked in campaign
How to run an effective linked in campaignteam-abr
 
Unemployment paradox in the mena region
Unemployment paradox in the mena regionUnemployment paradox in the mena region
Unemployment paradox in the mena regionteam-abr
 
Mall medicine
Mall medicineMall medicine
Mall medicineteam-abr
 
Health tourism in the uae
Health tourism in the uaeHealth tourism in the uae
Health tourism in the uaeteam-abr
 
Hospitality & luxury
Hospitality & luxuryHospitality & luxury
Hospitality & luxuryteam-abr
 
Uae – innovating to grow & diversify
Uae – innovating to grow & diversifyUae – innovating to grow & diversify
Uae – innovating to grow & diversifyteam-abr
 
10 time management techniques
10 time management techniques10 time management techniques
10 time management techniquesteam-abr
 
We can do it as arabs
We can do it as arabsWe can do it as arabs
We can do it as arabsteam-abr
 
Arab public administration
Arab public administrationArab public administration
Arab public administrationteam-abr
 
The arab digital divide
The arab digital divideThe arab digital divide
The arab digital divideteam-abr
 
Workplace wellness an investment well worth it
Workplace wellness an investment well worth itWorkplace wellness an investment well worth it
Workplace wellness an investment well worth itteam-abr
 
Social and emotional learning
Social and emotional learningSocial and emotional learning
Social and emotional learningteam-abr
 
The nomadic patient
The nomadic patientThe nomadic patient
The nomadic patientteam-abr
 
Being an entrepreneur in the gulf
Being an entrepreneur in the gulfBeing an entrepreneur in the gulf
Being an entrepreneur in the gulfteam-abr
 
Hashtag abuse
Hashtag abuseHashtag abuse
Hashtag abuseteam-abr
 
Al etihad credit bureau
Al etihad credit bureauAl etihad credit bureau
Al etihad credit bureauteam-abr
 

Plus de team-abr (20)

Can investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recoveryCan investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recovery
 
Higher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystemHigher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystem
 
Time of the machines
Time of the machinesTime of the machines
Time of the machines
 
Addressing pilot shortage
Addressing pilot shortageAddressing pilot shortage
Addressing pilot shortage
 
How to run an effective linked in campaign
How to run an effective linked in campaignHow to run an effective linked in campaign
How to run an effective linked in campaign
 
Unemployment paradox in the mena region
Unemployment paradox in the mena regionUnemployment paradox in the mena region
Unemployment paradox in the mena region
 
Mall medicine
Mall medicineMall medicine
Mall medicine
 
Health tourism in the uae
Health tourism in the uaeHealth tourism in the uae
Health tourism in the uae
 
Hospitality & luxury
Hospitality & luxuryHospitality & luxury
Hospitality & luxury
 
Uae – innovating to grow & diversify
Uae – innovating to grow & diversifyUae – innovating to grow & diversify
Uae – innovating to grow & diversify
 
10 time management techniques
10 time management techniques10 time management techniques
10 time management techniques
 
We can do it as arabs
We can do it as arabsWe can do it as arabs
We can do it as arabs
 
Arab public administration
Arab public administrationArab public administration
Arab public administration
 
The arab digital divide
The arab digital divideThe arab digital divide
The arab digital divide
 
Workplace wellness an investment well worth it
Workplace wellness an investment well worth itWorkplace wellness an investment well worth it
Workplace wellness an investment well worth it
 
Social and emotional learning
Social and emotional learningSocial and emotional learning
Social and emotional learning
 
The nomadic patient
The nomadic patientThe nomadic patient
The nomadic patient
 
Being an entrepreneur in the gulf
Being an entrepreneur in the gulfBeing an entrepreneur in the gulf
Being an entrepreneur in the gulf
 
Hashtag abuse
Hashtag abuseHashtag abuse
Hashtag abuse
 
Al etihad credit bureau
Al etihad credit bureauAl etihad credit bureau
Al etihad credit bureau
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 

Dernier (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

Byod in the middle east

  • 1. 1 www.arabbusinessreview.com BYOD in the Middle East  The rise in IT spending is fueling the increased adoption of the bring-your-own-device (BYOD) culture in the region, and given its inherent advantages for employees and employers, BYOD adoption is bound to grow further in the coming years.  However, BYOD adoption is accompanied by IT security risks arising out of lack of awareness about device security among employees. The situation is compounded by insufficient network resources and the lack of formal BYOD policies at organizations to manage security risks emanating from use of personal devices on official servers and networks.  CIOs in the region need to respond by preparing IT networks and formulating a BYOD policies, which are designed to manage this increased demand for BYOD and mobile diversity in the region. An Employee Engagement Tool or an IT Threat?  Middle East is among the fastest growing IT markets in the world, with IT spending in the region expected to exceed $32 billion in 2014. As per the latest IT forecast by IDC, spending on IT products and services in the Middle East will increase 7.3% year on year and
  • 2. 2 www.arabbusinessreview.com will cross $32 billion in 2014. Nearly 75% of this expenditure is expected to come from individual customers, the public sector, and the communications and financial services verticals. The key growth driver will be public sector investments in improving government services, education, and healthcare services in the GCC region.  The rise in IT spending is fueling the increased adoption of the bring-your-own-device (BYOD) culture in the region, as the increased proliferation of smartphones and tablet PCs, as well as increased mobility of workforces is forcing a shift in the way that companies operate on a day-to-day basis. A survey by Aruba Networks found out that employers in the Middle East were more likely to say Yes to BYOD, as compared to companies in other parts of the world. The study found that 70% of EMEA enterprises allowed some form access from personal devices, a figure backed by Cisco’s 2013 Middle East ICT Security which found that almost two-thirds of employees in the region are allowed to use their own devices to access the company server or network. Percentage of Companies saying Yes to BYOD across Regions Source: Aruba Networks  Given its inherent advantages for employees and employers, BYOD adoption is bound to grow further in the coming years. BYOD allows workers to operate on devices that they are comfortable working on, and in some cases from a location of their choice (e.g. home), thus extending flexibility in working environment. Therefore, the BYOD culture benefits
  • 3. 3 www.arabbusinessreview.com employees and bossts their motivation and engagement levels. But its benefits are not limited to employees are alone. Employers too stand to benefit considerably. As per Cisco Consulting Services estimates, the annual cost benefits of BYOD range from $300 to $1,300 per employee, depending on the employee’s job role. In addition, happier and motivated employees have higher productivity, and are more likely to focus on innovation rather than just dealing with daily chores at workplace, thus contributing to the overall growth of the organization.  However, BYOD adoption is accompanied by IT security risks arising out of lack of awareness about device security among employees. The use of mobile devices like smartphones and tablets is expected to grow over the next few years, as the region is expected to have 850 million mobile users by 2017. And most of these devices will also be used by employees at workplace as BYOD adoption increases – this is corroborated by the Middle East ICT Security Study that found that nearly 64% employees are allowed to use their own devices to access the company server or network. However, 65% of employees their own devices in the workplace currently do not understand the security implications of using personal devices in the workplace, thereby exposing the company server or network to high degree of IT security risk.  The situation is compounded by insufficient network resources and the lack of formal BYOD policies at organizations to manage security risks emanating from use of personal devices on official servers and networks. As of 2013, only 55% companies in the Middle East have a plan or a formal policy to manage the use of personal devices for work related purposes. As a result, cyber-criminals are increasingly attacking internet infrastructure rather than individual computers or devices, with password and credential theft, infiltrations, and breaching and stealing data. Therefore, it is not surprising that businesses in the Middle East are facing a growing risk of cyber-attacks as per the 2014 IT Security Study in the Middle East.
  • 4. 4 www.arabbusinessreview.com As per the Aruba Networks survey, the IT security challenge is accompanied by insufficient network resources to support the influx of multimedia-rich devices, as 35% organizations claimed that they did not have enough wireless coverage and capacity for supporting BYOD.  Overall, the key challenges and concerns highlighted by businesses considering or implementing BYOD in the region are:  Securely connecting devices (especially mobile) to corporate networks  Avoiding an increase in IT resources and expenses  Ensuring wireless coverage and capacity  Ensuring device security  Establishing corporate policies and acceptable uses  Enforcing access rights to resources based on user, device, and app  CIOs in the region need to respond by preparing IT networks and formulating a BYOD policies, which are designed to manage this increased demand for BYOD and mobile diversity in the region. As a first step, CIOs need to develop IT infrastructure that is capable of supporting a broad array of devices without overburdening their IT staff. With mobile devices leading the BYOD adoption, this would mean increased investment in wireless infrastructure in the coming years. The requisite IT infrastructure development needs to be complemented by developing and implementing organization-wide BYOD strategy and policy. To develop an effective policy, organizations need to define and understand factors such as which devices and operating systems to support, security requirements based on employee role and designation, the level of risk they are willing to tolerate, and employee privacy concerns. The key characteristics of a good BYOD policy are:  Balances security requirement vs. employee experience and privacy. It is important to develop policies that have minimal impact on employee’s experience, while maintaining the required security levels. Equally important is defining and communicating the level of vigilance/monitoring that IT department plans to implement to monitor device usage.
  • 5. 5 www.arabbusinessreview.com Given that BYOD is an employee-driven phenomenon, a policy that is too restrictive or invades user privacy might prove counter-intuitive to the whole concept (and related benefits) of BYOD. So mapping the security requirement based on employee role is critical.  Supports multiple devices and operating systems: It is important for CIOs to factor-in all types of platforms and operating systems used by employees. While iOS is a natural choice due to the high level of in-built security, Windows (phone, PC, tablets) and Android (phone, tablets) have also gained immense popularity and can no longer be overlooked.  Is flexible (semi-BYOD): for organizations that have high degree of data security risk (e.g. financial services firms), CIOs can opt for semi-BYOD policies which allow their employees to use their own devices so long as they comply to a list of company-approved devices, so that IT departments don’t have sleepless nights over what devices their networks might have to accommodate.  Most importantly, a good BYOD strategy is focused educating employees about BYOD policies and ensuring compliance to alleviate related risks. It is important for organizations to not just develop such policies, but also provide guidance on ‘Do’s and Don’ts’ and best practices on using personal devices for official purpose. Conducting company-wide roadshows and training/counselling sessions, followed-up by online tests around the company’s BYOD policies is another way to driving home the message of the company’s seriousness about such initiatives and IT security at the same time. We believe designing and implementing BYOD policies is important not just for organizations that either adopted or are considering BYOD, but for others as well since BYOD adoption is a question of ‘when’ and not ‘if’ for businesses in the region. The article was originally published at: Arab Business Review To read more thought-leadership stuff by leaders from Arab Region, please visit Arab Business Review