SlideShare une entreprise Scribd logo
1  sur  13
Handheld Devices & BYOD: Are Enterprises There Yet?
Term Paper by Team ‘Unhygienix’
Anusha Subramanian, Shadin Cornelio, Siddharth Shashidharan, Vishrut Shukla
Management of Information Systems & Technology (MIST)
(Term III - PGP 2012-14)
Indian Institute of Management Bangalore

Introduction
The consumerization of IT has led to a shift in the IT culture of companies by making it more employeedriven and less reliant on IT departments, implying that consumer technologies are increasingly being used
in the workplace, as opposed to specific enterprise IT solutions. The increase in faster, easier-to-use and
better consumer devices has caused this shift by compelling employees to bring their personal devices to
their workplaces as well. Sensing an opportunity to satisfy their employees’ desires of flexibility and
mobility, a number of large corporates such as Cisco and IBM have become cheerleaders of the ‘Bring Your
Own Device’ (BYOD) concept and have begun permitting employees to use their own smartphones, tablets
and laptops on the corporate network. BYOD is increasingly touted to enhance the time spent by employees
on work-related issues and facilitate more effective collaboration. Cisco has described this concept as “WorkYour-Way” with the vision of allowing employees to work on any device at any time and from any place.

Limit

Basic

Advanced

Environment requires
tight controls

Basic access for
additional devices

Any device, anywhere,
enhanced security

Any device, anywhere,
anyone

IT approved devices

Broader device set

Wide range of devices

IT managed devices
with mainly on-site
access

IT managed devices
with on-site access

Corporate and employee
owned devices with full
on-site / off-site access

Wide range of devices
Corporate and employee
owned devices with full
on-site / off-site access
Custom native apps
Enhanced services for
Guest/customer devices

All other devices
prohibited on network

Employee owned and
Guest devices with
Internet only

Device-side security,
Internet on Guest device

Embrace

Typical Use Cases
Financial services
firms restrict access
to confidential
financial data

Educational
institutions allow
basic services to
everyone (eg: email)

Healthcare providers
offer differentiated
services based on role
(eg: select corp data)

Mobile sales
enterprises offer
videos and
collaboration sessions

Fig. 1: Different Levels of BYOD Adoption Scenarios (Reproduced from Cisco Bring Your Own
Device - Device Freedom without Compromising the IT Network Public Whitepaper, April 18, 2012)

However, BYOD is not a cakewalk when it comes to implementation and has its own share of issues that
affect fundamental information security policies in organizations. According to a research study undertaken
Handheld Devices & BYOD: Are Enterprises There Yet?

Page 1of 13
by Logicalis, around 17.7% of the employees surveyed claimed that their IT departments were uninformed
of their usage of personal devices at the workplace, and 28.4% suggested that their IT departments
preferred to actively ignore paying special attention to the IT consumerization trend despite being aware of
it. This is set to change though as data security, featuring as the #1, #2 and #3 concern for top CIOs today has
recently gained back the limelight thanks to high profile data breaches at firms like Yahoo! and LinkedIn.
Unsurprisingly, more than 50% of the firms surveyed by Forrester Consulting reflect serious concerns about
BYOD speculating whether adopting this phenomenon is a gateway to hell by opening a fatal can of worms
for IT policy enforcers.
There is however no doubt that BYOD is keeping everyone across the board busy and is a truly enterprisewide project engaging the engineering teams, application teams, security and compliance teams as well as
executives and human resources personnel. Technical experts are busy ironing out the remaining wrinkles
in the technology architecture. IT policy makers are debating about clear guidelines and best practices that
they should adopt in order to prevent BYOD from slipping out of control. Business executives are weighing
the predicted productivity improvements and revenue gains against the serious security challenges and
careful change management to be undertaken when deciding to throw the switch in favour of BYOD.
Notwithstanding, industry watchdogs and experts are busy debating whether BYOD is another one of those
mere fads presently generating a lot of buzz at its peak of inflated expectation or whether it will persist and
proliferate to change the way companies conduct business.

Field Data
For the purpose of gaining first-hand insights into the above mentioned topics, the authors studied world’s
leading network equipment manufacturer Cisco Systems, Inc. - one of the early adopters and enthusiastic
cheerleader of the BYOD trend. Cisco, which has applied the BYOD programme within its corporate
organization for employees and is encouraging partners to follow suit as well, also offers BYOD solutions
portfolio for clients under its ‘Borderless Network’ vision. The aim of the field research was to find out how
mobile technologies fit into Cisco’s organizational philosophy, the current scale of handheld device
usage/deployment in the organization, the design of the technology architecture, early signs of impact
created by the adoption of tablets and BYOD in business terms, top management’s, IT policy makers’ and
employees’ perspectives about the new trend, how the enterprise’s IT Policy has been modified to
accommodate these changes, strategic and operational challenges being faced by the company in BYOD’s
adoption and key takeaways for the future.
 Executive Perspective: To get deeper insights from the topmost decision-making level regarding BYOD
adoption, the authors interviewed Mr. Johnson Jose, Senior Director, Cisco I.T. in detail. According to Mr.
Jose, the product companies are set to gain the most by shifting to employee-owned devices as besides

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 2of 13
saving IT support costs for the company, the boost in employee productivity translates into business
profits without fail. The services companies that bill their clients based on the number of hours billed
may see a contradiction with BYOD as tremendous increases in employee productivity may negatively
impact the number of billed hours for such companies and hence, they may only support BYOD from the
outset. Mr. Jose also mentioned that though the technology and security architectures are almost fully
ironed out for a wide-scale BYOD deployment model, the biggest challenges of dealing with employee
resistance to change and climbing a steep adoption curve still remain to be addressed as not all
employees, especially at the senior level see value in changing the way they work daily with their
devices. He stressed that consistency of user experience and alignment of changed policies with simple
logical human behaviour will be critical to ensure the success.
 IT Policy Maker Perspective: As part of the detailed field research undertaken, the authors conducted a
personal interview with Mr. Kiran S. Narayan, I.T. Manager at Cisco Systems about the implementation
and future of BYOD at Cisco. According to Mr. Narayan, stage-wise rollouts of pilot BYOD programmes
are well underway in different parts of the organization beginning with the support for smartphones and
tablets. The choice of devices is explained by the fact that these are the most widely used categories in
electronic media apart from PCs and laptops. Cisco currently has over 100,000 end points that include
employees’ personal devices being used for a broad range of work-related tasks. Again, Mr. Narayan
stresses on the fact that from the corporate point of view, the motivation for implementing and
encouraging BYOD is increased productivity, enhanced user experience and more flexibility for users,
rather than savings in cost. According to Mr. Kiran, it is interesting to note that the growth in BYOD
mirrors the trend in two other important areas – data usage and virtualization. Data consumption
around the world has seen an explosive growth in the recent past due to better network infrastructure
and connectivity. Cisco uses a thin client known as Virtual Exchange Information (VXI), an interface
based on virtualization to provide highly secure connectivity to the company network from anywhere
and on any supported device. In 2010, Cisco introduced its popular AnyConnect VPN Client, a secure
remote login software that creates an encrypted connection from the user’s end device into the company
network. Before a foreign device is granted access to the company network, Cisco IT first checks if the
device conforms to a prerequisite set of features, known as a ‘posture’. This comprises of some basic
software such as anti-virus package, basic security agent equipped with screening intelligence to name a
few. Thereafter, device identity is established and credentials are verified. As Mr. Kiran pointed out, this
is done because the company needs to know what type of device is being granted or denied access in
order to avoid compromising on security of the network. The company is currently experimenting with
different user bases to identify the best way in which BYOD can be introduced on a larger scale beginning
with the laptops segment. However, even within Cisco, BYOD cannot be implemented throughout the
company because the sensitivity of work varies from one area to another. Another issue that IT policy

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 3of 13
makers in Cisco are grappling with is the stark difference in the architecture and development cycles of
different platforms running on handhelds such as iOS, Android and Windows. Mr. Kiran is quick in
pointing out that while Apple has a relatively longer development period for each updated version of its
iOS, Android versioning is much more rapid. Windows for the mobile platform is pretty nascent and
faces several stability issues. This is demanding scaled up efforts from Cisco IT teams who are tasked
with making access to company network available on these devices in a secure and consistent manner.

Analysis of BYOD in Enterprises
Drivers of the BYOD Phenomenon
 Devices Lead BYOD’s Promise of Delivering ‘Beyond the Buzz’: The truth is that the BYOD trend does
much more than only addressing some of operational issues which it is mostly perceived to resolve. It is
about end users being able to use the computing and communication devices of their own choice whether
purchased by the employer, purchased by the employee, or both. The fact that multiple devices exist
today for multiple needs (refer to Fig. 1 for device sales) is widely believed to ultimately make way for a
single device which will be used for all their computing and communication needs. However, most
experts seem to disagree as there will be different devices best suited to some particular uses for example
Fig. 2: PC & Non-PC Sales 2011 (in millions)
(Source: Deloitte, 2011)

laptops have larger screens, faster performance and
support

more

applications

which

tablets

and

smartphones cannot deliver. The United States and India
are already leading other countries in the percentage of
knowledge workers using mobile devices (at nearly 70
%), and countries like China and Mexico are not far
behind. This finding feeds positively into the BYOD
phenomenon as it indicates that people are using
multiple mobile devices, such as laptops, smartphones,
and tablet computers, to help them accomplish their
tasks. Supporting the above claim with some relevant numbers here, it is estimated that by the end of
2013, the number of mobile-connected devices will exceed earth’s population; whereas by 2017 the
world will see over 10 billion mobile-connected devices i.e. nearly 1.4 mobile devices per person. Out of
these, 86% will be handheld or personal mobile-ready devices and not surprisingly, the biggest gain in
traffic share will come primarily from two areas: a) machine-to-machine (M2M) usage, fuelled by the
emergence of the ‘Internet of Things’ and explosion of ‘big data’ (5% of all mobile connections in 2012,
17% in 2017); b) smartphones (16 % in 2012, 27% in 2017). The highest growth area will be handheld
tablets growing at a CAGR of 46% followed by M2M at a CAGR of 36%. From an enterprise perspective, on
an average, IT leaders expect the number of computing devices to rise from 2.3 per employee in 2012 to
Handheld Devices & BYOD: Are Enterprises There Yet?

Page 4of 13
2.8 in 2014. Table 1 lists the increase in device units and
Type of
Device

Growth in
Devices,
2012-2017
CAGR

Growth in
Mobile Data
Traffic, 20122017 CAGR

above estimates, one can argue that BYOD, presently climbing

Smartphone

20%

81%

up its technology lifecycle curve, will continue to stay at the

Tablet

46%

113%

Laptop

11%

31%

M2M Module

36%

89%

corresponding increase in the mobile data traffic on these
devices. Based on the promising outlook established via the

‘peak of inflated expectations’ for quite some time, before
dipping down to the ‘trough of disillusionment’ point, if at all in
future. Cisco’s IBSG survey results confirm this as well since
according to the survey, 42% of smartphones and 38% of

Fig 3: Global Device Units and
Mobile Data Traffic Growth
(Source: Cisco VNI Mobile Forecast 2013)

laptops used in workplaces are now employee-owned thus showing that BYOD, far from being an
emerging trend, is already quite entrenched in enterprises.
 Highly Collaborative Applications & ‘Network as a Platform’: The latest published Cisco Visual
Networking Index (VNI) 2013 provides interesting insights about increasing IP traffic in the world. Global
mobile data traffic grew 70% in year 2012 and reached 885 petabytes per month at the end of 2012, up
from 520 petabytes per month at the end of 2011. To put things into perspective, global mobile data
traffic in 2012 (885 petabytes per month) was nearly 12 times greater than the total global Internet
traffic in 2000 (75 petabytes per month) and for the first time, mobile video traffic exceeded 50% of the
entire traffic in 2012. Cisco further forecasts 11.2 exabytes per month of mobile data traffic by the year
2017 and these figures appear conservative by all estimates since they do not reflect the tablet and
smartphone traffic that has largely remained on fixed corporate networks such as office WiFi’s etc. The
concept of ‘Network as a Platform’ has already gained momentum in enterprises as work applications,
pervasive mobility and new collaboration tools all use rich media, driving a large increase in the amount
of video and multimedia traffic traversing the network. In addition to this, as more and more enterprise
applications

get

exported

to

cloud-based

infrastructure, network data traffic can only
move in one direction, that of exploding growth.

Exabytes
per
month

Fig. 4: Worldwide Mobile Data
Traffic Forecast (2010-2017)
(Source: Cisco VNI Mobile Forecast 2013)

Interestingly, a 2012 research conducted by
Cisco points out that 47% of employees in

66% CAGR 2012-17

companies under the study were officially
designated

“mobile

workers”,

however

a

staggering 60% of employees actually use a
mobile device for work. In India alone, the
corresponding proportions are 51% and 69%
respectively.

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 5of 13
 Overlap between Work and Personal Fuels into the User’s Motivation: Most enterprises are openly
recognizing the fact that contrary to the prevalent view about work being a place where people go to, it is
actually an activity which people do. Extended connectivity through secure mobile and remote access to
the corporate network allows employees tremendous flexibility and increased productivity by blurring
the line between designated personal and work time. Mobility allows friends, family, and colleagues to
reach them at any time. Thus as employees often end up interweaving work and personal tasks, they
probably do not want to carry and switch between personal and work devices and rather use the same
device currently held in their hands to attend to all kinds of tasks including corporate work as well. In
brief, today’s knowledge worker is never really “out of the office”. BYOD is attractive because strict lines
of demarcation over what content can be accessed, downloaded, or used on a company-owned device are
blurred on a device owned by the employee giving them great control by design. A major caveat to this,
and a pretty serious one, however is that co-mingled data on the user devices may lead to security and
privacy challenges, which will be explored further in the following discussions.
 Management keeps productivity gains in mind and not cost savings: From primary discussions the
authors have had with executives in corporates and based on the secondary literature already available
on BYOD, it has been established that executives are seldom adopting this trend keeping only the
resulting cost reductions in mind. As Deliotte’s CIO Matt Peers puts it succinctly, executives must never
subscribe to that point of view by allowing themselves into a short-sighted, cost reduction mentality
which, apart from being quite counterproductive, can be outright
dangerous as well. While it may seem contrary to what BYOD was
perceived to be – another one of the cost cutting measures by
large corporates, it is found that while the cost of
procuring, customizing, maintaining, servicing and
disposing company-owned devices will definitely go
down with this policy being around, the expense of
application security, access authentication, backend infrastructure
and regulatory compliance tends to increase. Realizing this trend, the
top-of-the-mind return that corporate management is expecting from BYOD rollouts in
their organizations is a boost in employee productivity (and therefore revenues) due to
the choice and flexibility enabled by this policy. There are, however, mixed empirical results with respect
to productivity gains caused by BYOD. A recent study conducted by business communications expert Sam
H. DeKay concludes that the research does not convincingly demonstrate that BYOD improves the
productivity of employee communications and other computing functions in an organization on its own.
On the other hand, a 2012 survey of 202 BYOD decision-makers in enterprises conducted by Forrester
Consulting in the United Kingdom, United States, France and Germany found that more than 80% of

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 6of 13
employees reported an increase in productivity due to BYOD as they could communicate more frequently
with co-workers from anywhere. Therefore, corporate decision-makers should give careful thought to
adopting a BYOD implementation if their primary rationale is to enhance workforce productivity.
Additionally, there will always be certain industries like investment banking and defence, where the very
nature of work will discourage the adoption of BYOD, primarily driven by the need for absolute security
of data.

Typical Use Cases for BYOD & Order of Effects
Home Workers / Telecommuters are, by default, prime BYOD candidates,
especially if they belong to the contract workforce. The freedom to use their
own personal device can lead to increased productivity. Device level and
network security needs special attention in case of telecommuters.
Mobile Workers who travel most or all the time, often to client sites
will be benefited if permitted to use their personal mobile devices or
employer-provided devices at the client location. The most secure
option for many of these workers is typically an encrypted VPNconnected secure device that accesses the virtual corporate
Fig. 5: First-Order, Second-Order and
Third-Order Effects of BYOD

network of their employer. Ensuring a ‘no local data stored’
approach i.e. all data is fetched on-demand from the corporate
server and is flushed out when the connectivity gets lost, leads

to peace of mind for IT policy enforcers as a lost laptop or a smartphone does not post a security threat to
the enterprise. Sales Professionals will largely benefit from BYOD as they can access data about the
customers and transaction history via the corporate CRM on their handheld device anytime in the field.
Permanent Employees who commute daily to office at times choose to take work home. Since they work
at night, on weekends, during holidays, while on flights and in airport lounges, most such users prefer a
handheld device they are familiar with. Here, BYOD comes to their rescue by allowing them to use their
new breed of smartphones and tablets to connect securely to the company network. Since companyprovided devices though more expensive, are more secure and easier to remotely manage, BYOD’s
successful implementation in each of the above use cases hinge heavily on addressing security and
privacy concerns.

Challenges and Risks with BYOD Adoption
Experts and IT policy enforcers across the board believe that while many of the benefits of BYOD, such as
letting users exercise their choice of using any device anywhere and anytime are accepted to add to
employees’ satisfaction, productivity and business revenues, they are somewhat antithetical to the

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 7of 13
traditional IT requirements for strict security, device service and support. Some of the key challenges that
may potentially turn BYOD into ‘Bring Your Own Demise’ are identified as follows:
 Providing Device Choice and Support to Users: Traditionally, the IT team in organizations maintained
a pre-determined list of approved workplace devices which employees could choose from, typically a
standardized desktop, laptop, and perhaps even a small, standardized set of mobile phones and
smartphones for sales workers and mobile workforce. The BYOD adoption mandates IT to essentially
support all kinds of user devices but keeping practicality in mind, it is a tough problem to solve.
Handheld consumer devices are evolving so rapidly that it is impractical to pre-approve each and every
brand and form factor. It is also somewhat impractical to expect IT organizations to have the same level
of support for each and every device that employees may bring to the workplace. The policy designers
are struggling to find a mid-way to keep supporting the BYOD vision to the farthest extent possible
within the constraints of the practical limitations of IT support and implementation. Presently, most IT
decision-makers have established, at a macro level, the types of devices they will support on their
network based their decision on unacceptable security readiness or other user experience factors.
However, the support for newer devices keeps getting added from time to time. As far as servicing the
user devices are concerned, most organizations have uniformly favoured the adoption of self-support
models with very limited or no specific device-level support from corporate IT’s side.
 Maintaining Secure Access to Corporate Network: The primary success criteria of any BYOD
implementation is to ensure security is not sacrificed. IT teams are struggling to establish the minimum
security baseline that any device must meet to be used on the corporate network, including WiFi
security, VPN access and perhaps add-on software to protect against malware. In addition, due to the
wide range of devices, it is critical to be able to identify each device connecting to the network and
authenticate both the device and the person using it. IT department needs to minimize the risk of data
loss or incursion. Securing corporate data, applications, and systems is essential for any BYOD strategy.
 On-Boarding of New Devices: Bringing in a new user device onto the network for the first time should
ideally be simple, self-service with minimal or zero IT intervention and should be clientless i.e. without
the requirement of any pre-installed software on the new device. All IT should be able to do is push
updates to the on-boarded devices as the policy mandates.
 Enforcing Company Usage Policies: Adoption of BYOD must provide a way to enforce policies in line
with explicit business requirements as well as regulatory compliance needs depending upon the
industry. This can be challenging on a wide flavour of consumer devices like tablets and smartphones.
For example, access to the Internet, peer-to-peer file sharing and the usage of specific applications may

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 8of 13
be subject to different policies depending on whether the users are on their personal time and network
or whether they are accessing the corporate network during work hours. The growing usage of
unapproved collaboration tools on user devices for corporate work is a serious concern as well.
 Protection of Data and Loss Prevention: In industries bounded by strict
regulations, the IT department needs to show compliance is possible with
BYOD adoption, which can be more challenging, compared to when
corporate-owned and managed devices were involved. Cloudbased file sharing and storage services may be convenient for
personal data of employees, but can be potential sources of
leakage and information breaches for confidential corporate data.
Mobile device management (MDM) products and services often come
across as the obvious, reflexive response to the need for more secure mobile
computing, but a growing number of experts now agree that the answer to BYOD is
not to control the device (which was the case for company-owned devices), but to control the data.
Mobile Application Management (MAM) and software-based authentication is the preferred approach
among IT departments now.


Device Management and Visibility on the Network: Many of the handheld devices support multiple
connectivity modes ranging from wired and wireless Ethernet (Wf-Fi) to 3G/4G mobile networks.
Switching between these different modes during a session is common and IT needs to ensure visibility of
all the devices on the corporate network and beyond taking this into account.
 Ability to Revoke Access Privileges for Devices: Under unexpected circumstances during the lifecycle
of a device or employee, it may become necessary to terminate access to the corporate network and data
from the user’s device. This becomes a common concern in case of a lost or stolen device, employee
termination or even an employee changing roles within the company. Using MAM, IT department needs
to ensure they have the ability to immediately revoke access granted to any device and possibly wipe
some or all of the data and applications remotely from the device, if the situation demands so.
 Managing the Increase in Connected Devices: The increasing number of devices connected to the
network, most likely with each employee having more than one device simultaneously connected, can
lead to IP address starvation as most legacy IP address plans were created under the assumption of
fewer devices. This will demand that the IT department hastens the need for IPv6 deployments both
inside the enterprise network and at the network edge via to allow secure remote connections.

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 9of 13
 Keeping the Implementation Simple and Accessible for Users: Different brands and form factors of
devices may require different steps for on-boarding and getting connected to the network. The security
policies differ depending upon how and where the user is trying to connect. For example, corporate WiFi
may require only credentials, whereas connecting through a public wireless hotspot may mandate the
use of a VPN connection and increased security steps. A BYOD solution needs to be as simple as possible
for users, should be able to provide a consistent experience across device no matter where and when
users are connecting from. IT must ensure critical tasks such as mobile printing should be supported
from each of the wide range of user devices to guarantee a seamless experience.

Policy Prescriptions and Best Practices for BYOD Adoption
To address the challenges and complexities identified above, the authors prescribe the following IT policy
design and approach for BYOD rollout in any organization:

deployments are easy with users who only need low
levels of IT support, possibly using self-support
communities to share best practices. Deployments
may be more difficult with users who have high
mobility needs but also require high support levels,
such as executives. Conducting such an analysis will
help in understanding the entitlement policies and
support models and may prevent cost overruns in
the IT budget.


Low Need for Support High

 Understanding User Segments & Needs: BYOD
Admin/Clerical
Call Center/Support
Finance

Executives
Sales Reps
Healthcare Worker

IT Support
Educator/Trainer
Technical Support

Engineers
IT Staff
Technical Sales

Low

Need for Mobility

High

Fig. 6: User Segments & Needs
(Reproduced from Cisco Whitepaper)

Selecting a BYOD Adoption Strategy: The IT decision-makers need to select one out of the four levels
of adoption strategies as described in Fig. 1 earlier based on their business requirements and risk profile
of exposing users to BYOD policies.



Lost or Stolen Device Policy: The IT policy must choose one out of the different solutions with varying
degrees of capabilities to reach out to a device remotely and destroy data or applications to ensure they
remain confidential.



Choosing the Right Application & Data Strategy: Adopting the right approach towards serving data
and content on the wide array of user devices under BYOD is perhaps the most critical decision the IT
has to make. The current architecture allows the choice from among the following options:

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 10of 13
Native Application

Native
Application

Data
Centre

HTML Layer
Native Application
Data
Centre

Web
Browser

Desktop Virtualization
Client
Native Application
Desktop
Virtualization
Client

Native
- Local data on device
- Maximum performance
- Native device experience
- Offline possible

Browser
- Local data on device
- Portable to many devices
- Browser experience
- Always connectivity required

Virtual
- No local data on device
- Maximum security
- Translated experience
- Always connectivity required

Data
Centre

Fig. 7: Application & Data Mode Choices in a Typical BYOD Deployment
(Reproduced from Cisco Bring Your Own Device - Device Freedom without Compromising
the IT Network Public Whitepaper, April 18, 2012)



The Human Factor - User Cooperation & Change Management: Under BYOD, where the real benefit
for the employee comes into play is the concept of working your way (WYW) as Cisco calls it, but often
there are cultural and generational mindsets that make it difficult for employees to see value in this
change. CEOs, CIOs and executives in organizations need to dig deeper to find out if their employees are
culturally ready and mature enough to adopt the WYW life for success. The change leaders need to
understand and communicate the benefits of BYOD clearly: a) great place to work; b) work-life balance;
c) reputation; d) employee loyalty and turnover and e) long term socio-economic impact of adopting a
more flexible work style. Change management needs to be carried out in a careful manner to avoid
alienation of older employees who may not see much value in moving away from the current model of
work owing to a variety of reasons like loss of dedicated space, disturbances from family, out-of-pocket
costs, socializing nature vs isolation, productivity, change in management style and company culture.

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 11of 13
Conclusion
Old Wine in a New Bottle? The authors conclude that BYOD is not a new concept altogether. For years now,
there have been a minority of disgruntled users, employees who cannot abide by company-prescribed
devices. Mac users, for example, have always fought against the predominance of Windows laptops at work,
claiming they hinder productivity. For an entire generation, now in their thirties and beyond, the primary
means of content consumption was the PC/Mac, followed by the laptop. Naturally, these evolved to be fullfledged productivity enhancing devices, to the point where the idea of doing any work without a laptop
became inconceivable. However, a paradigm shift has been observed in the way the next generation of
employees are perceiving handhelds. For this new generation, the idea of demarcating work and their
private life seems unnecessary and therefore, they expect to be able to surf the web, play games, connect to
their office workstations, text, chat and e-mail on any and all of their devices. This is the demographic that is
primarily going to drive BYOD adoption in companies, as they try to engage with employees and provide
them with a flexible work environment.
BYOD as a Source of Competitive Advantage: In a stark difference when compared to the previous cycle of
smartphone adoption by enterprises, this time, the CIOs across the board are thinking long-term by talking
about BYOD as a source competitive advantage - in enabling retention of the best talent and employee
satisfaction and in higher productivity, allowing work from anywhere, on any device. In this endeavour,
many companies are actively developing apps and endpoint protection services for tablets and smartphones.
Some companies are also trying to pre-empt new releases of phones (like the iPhone 5), so that users can
have a seamless transition. In public forums and site meetings, CIOs are making all the right noises about
empowering employees and reduced controls, banking on improved productivity to pay off their
investments in this early adoption of this new trend. This optimism surrounding BYOD, however, needs to be
supported wholeheartedly by IT departments by finding ways to efficiently provide secure connectivity and
consistent user experience across the ever-growing pool of devices with different form factors and brands.
How will the Future Evolve? On a final note, the authors speculate tthe road ahead and what BYOD can
make possible in the long term. Globally, 89% of IT leaders from both enterprises and midsize companies
support BYOD in some form and 69 % view BYOD “somewhat” or “extremely” positively. Companies are
slowly developing a vision for BYOD in the workplace which ties into their long term strategy, of which
telecommuting may become a habit for a majority of employees. The world could be at the cusp of a
breakthrough – one where companies break out of cubicles and mostly fixed office hours to become truly
‘virtual enterprises’. The transformative benefit of BYOD lies in employee-driven innovation — by allowing
employees to decide how, when, and with which tools work is done, adopters of BYOD can potentially unlock
the next wave of value. Rather than rushing in for an unplanned deployment in their organization, by
fostering BYOD with proper management policies and strong governance model, companies can harness a
latent and potent source of gaining competitive advantage over others in the business arena.

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 12of 13
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.

15.
16.
17.
18.
19.
20.

Mobile-Friendly Workplaces, Lev-Ram, Michal, Fortune; 8/13/2012, Vol. 166 Issue 3
Gartner: Enterprises Must Adopt Tablets Early, Channel Insider; 4/6/2011
Business Embraces Tablets - With Caution, Nicholas Kolakowski, eWeek, 10/3/2011
BYOD Finds Increasing Support Among Businesses, Nathan Eddy, eWeek, 1/9/2013
Cisco ConnectedWorld Technology Report, Published by Cisco Systems Inc., 2011
BYOD: Enabling The Chaos, Gordon Thomson, Cisco Security EMEA Article
The iPass Global Mobile Workforce Report (Q4 2012), iPass Inc. 2012
BYOD: OMG! or A-OK?, SC Magazine: For IT Security Professionals, Sept/Oct 2012
Are you ready for the BYOD yet?, David Raths, T.H.E. Journal, May 2012
Study: IT Saying Yes To BYOD, ‘the network’ - Cisco’s Technology News Site, 5/16/2012
IT Consumerization: When Gadgets Turn Into Enterprise IT Tools, MIS Quarterly Executive, Sept. ’12
It Shift to Tablets – Have You Prepared?, Puneesh Chaudhry, SiliconIndia, July 2012
Visual Networking Index – IP Traffic Chart, Cisco Visual Networking Index
BYOD: A Global Perspective - Harnessing Employee-Led Innovation, Cisco Internet Business Solutions
Group Horizons (Survey Report), Joseph Bradley, Jeff Loucks, James Macaulay, Richard Medcalf,
Lauren Buckalew, 2012
For BYOD Best Practices, Secure Data, Not Devices, Thor Olavsrud, ComputerWorld Article
BYOD (Bring Your Own Device) Policies Affect Everyone, Peter S. Vogel, 5/18/2012, Link
Enterprise Security Challenges in the Emerging BYOD Era, CMR Research, Link
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017, Link
Bring Your Own Device – Agility Through Consistent Delivery, PWC Advisory Services Report
Cisco Bring Your Own Device - Device Freedom without Compromising the IT Network Public
Whitepaper, 4/18/2012

Handheld Devices & BYOD: Are Enterprises There Yet?

Page 13of 13

Contenu connexe

Tendances

Finding the value in BYOD
Finding the value in BYODFinding the value in BYOD
Finding the value in BYODCapgemini
 
Capgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
Capgemini Super Techies Show Season 2: The LinkedIn Challenge PresentationCapgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
Capgemini Super Techies Show Season 2: The LinkedIn Challenge PresentationCapgemini
 
Projections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI teamProjections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI teamneutrinoBI
 
ProcessCODI - A SmartWork Platform based on Social Patterns
ProcessCODI - A SmartWork Platform based on Social PatternsProcessCODI - A SmartWork Platform based on Social Patterns
ProcessCODI - A SmartWork Platform based on Social PatternsJaehoon Lee
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
[uengine.org]Process codi – a smartwork platform based on social patterns
[uengine.org]Process codi – a smartwork platform based on social patterns[uengine.org]Process codi – a smartwork platform based on social patterns
[uengine.org]Process codi – a smartwork platform based on social patternsHannah Kim
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
How to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT StrategyHow to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT StrategyMicrosoft
 
SAARC CIO Conference
SAARC CIO ConferenceSAARC CIO Conference
SAARC CIO Conferencedasubrato
 
IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009Kim Jensen
 
Adapting to new technology.edited
Adapting to new technology.editedAdapting to new technology.edited
Adapting to new technology.editedSadafZZaidi
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsMasaf Dawood
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
Microsoft in the enterprise
Microsoft in the enterpriseMicrosoft in the enterprise
Microsoft in the enterpriseIDGnederland
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 

Tendances (20)

Finding the value in BYOD
Finding the value in BYODFinding the value in BYOD
Finding the value in BYOD
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 
Exploring Early Enterprise 2.0 Methodology
Exploring Early Enterprise 2.0 MethodologyExploring Early Enterprise 2.0 Methodology
Exploring Early Enterprise 2.0 Methodology
 
Capgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
Capgemini Super Techies Show Season 2: The LinkedIn Challenge PresentationCapgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
Capgemini Super Techies Show Season 2: The LinkedIn Challenge Presentation
 
Projections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI teamProjections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI team
 
ProcessCODI - A SmartWork Platform based on Social Patterns
ProcessCODI - A SmartWork Platform based on Social PatternsProcessCODI - A SmartWork Platform based on Social Patterns
ProcessCODI - A SmartWork Platform based on Social Patterns
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
[uengine.org]Process codi – a smartwork platform based on social patterns
[uengine.org]Process codi – a smartwork platform based on social patterns[uengine.org]Process codi – a smartwork platform based on social patterns
[uengine.org]Process codi – a smartwork platform based on social patterns
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
How to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT StrategyHow to Build a Consumerization of IT Strategy
How to Build a Consumerization of IT Strategy
 
SAARC CIO Conference
SAARC CIO ConferenceSAARC CIO Conference
SAARC CIO Conference
 
IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009
 
Adapting to new technology.edited
Adapting to new technology.editedAdapting to new technology.edited
Adapting to new technology.edited
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programs
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Microsoft in the enterprise
Microsoft in the enterpriseMicrosoft in the enterprise
Microsoft in the enterprise
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
ISMI_Management Report
ISMI_Management ReportISMI_Management Report
ISMI_Management Report
 

En vedette

RippleLinks_Intro_CaseStudies (2)
RippleLinks_Intro_CaseStudies (2)RippleLinks_Intro_CaseStudies (2)
RippleLinks_Intro_CaseStudies (2)Ashwarya Vashisth
 
Presentación 2
Presentación 2Presentación 2
Presentación 2Tadeo12345
 
Renault Kwid: A Real Run for Money to the Small Cars in India
Renault Kwid: A Real Run for Money to the Small Cars in IndiaRenault Kwid: A Real Run for Money to the Small Cars in India
Renault Kwid: A Real Run for Money to the Small Cars in Indiashilpaverm
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2Adrian Mikeliunas
 
Alternanza scuola-lavoro Rema Control
Alternanza scuola-lavoro Rema ControlAlternanza scuola-lavoro Rema Control
Alternanza scuola-lavoro Rema ControlLinda4397
 
10 free indie games you don't wanna to miss
10 free indie games you don't wanna to miss10 free indie games you don't wanna to miss
10 free indie games you don't wanna to missshilpaverm
 
General practitioner and obstetric service in rural Nepal A way forward
General practitioner and obstetric service in rural Nepal A way forwardGeneral practitioner and obstetric service in rural Nepal A way forward
General practitioner and obstetric service in rural Nepal A way forwardarbin joshi
 
Overview of Office 365 - New Horizons Bulgaria
Overview of Office 365 - New Horizons BulgariaOverview of Office 365 - New Horizons Bulgaria
Overview of Office 365 - New Horizons BulgariaNew Horizons Bulgaria
 
Eight bangla class-21
Eight bangla class-21Eight bangla class-21
Eight bangla class-21Cambriannews
 
Setting up WordPress Blog or Website
Setting up WordPress Blog or WebsiteSetting up WordPress Blog or Website
Setting up WordPress Blog or WebsitePickaweb
 
PSD Associates Case Study - "Ride The Roller Coaster"
PSD Associates Case Study - "Ride The Roller Coaster"PSD Associates Case Study - "Ride The Roller Coaster"
PSD Associates Case Study - "Ride The Roller Coaster"Paul Davit
 
All new Ford Figo e Brochure
All new Ford Figo e BrochureAll new Ford Figo e Brochure
All new Ford Figo e BrochureAutomobile Planet
 
A social cartography of student data: Moving beyond #StudentsAsDataObjects
A social cartography of student data: Moving beyond #StudentsAsDataObjectsA social cartography of student data: Moving beyond #StudentsAsDataObjects
A social cartography of student data: Moving beyond #StudentsAsDataObjectsUniversity of South Africa (Unisa)
 
Kohinoor presentation final
Kohinoor presentation finalKohinoor presentation final
Kohinoor presentation finalcreativetweet
 
Class eight bangladesh & global studies content 03
Class eight bangladesh & global studies content 03Class eight bangladesh & global studies content 03
Class eight bangladesh & global studies content 03Abdulláh Mámun
 
Class 8 english lesson 2 introducing a table of contents
Class 8 english lesson 2 introducing a table of contentsClass 8 english lesson 2 introducing a table of contents
Class 8 english lesson 2 introducing a table of contentsAbdulláh Mámun
 

En vedette (18)

RippleLinks_Intro_CaseStudies (2)
RippleLinks_Intro_CaseStudies (2)RippleLinks_Intro_CaseStudies (2)
RippleLinks_Intro_CaseStudies (2)
 
Presentación 2
Presentación 2Presentación 2
Presentación 2
 
Renault Kwid: A Real Run for Money to the Small Cars in India
Renault Kwid: A Real Run for Money to the Small Cars in IndiaRenault Kwid: A Real Run for Money to the Small Cars in India
Renault Kwid: A Real Run for Money to the Small Cars in India
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2
 
Alternanza scuola-lavoro Rema Control
Alternanza scuola-lavoro Rema ControlAlternanza scuola-lavoro Rema Control
Alternanza scuola-lavoro Rema Control
 
10 free indie games you don't wanna to miss
10 free indie games you don't wanna to miss10 free indie games you don't wanna to miss
10 free indie games you don't wanna to miss
 
General practitioner and obstetric service in rural Nepal A way forward
General practitioner and obstetric service in rural Nepal A way forwardGeneral practitioner and obstetric service in rural Nepal A way forward
General practitioner and obstetric service in rural Nepal A way forward
 
Overview of Office 365 - New Horizons Bulgaria
Overview of Office 365 - New Horizons BulgariaOverview of Office 365 - New Horizons Bulgaria
Overview of Office 365 - New Horizons Bulgaria
 
Eight bangla class-21
Eight bangla class-21Eight bangla class-21
Eight bangla class-21
 
Setting up WordPress Blog or Website
Setting up WordPress Blog or WebsiteSetting up WordPress Blog or Website
Setting up WordPress Blog or Website
 
acta semanal 2
acta semanal 2acta semanal 2
acta semanal 2
 
PSD Associates Case Study - "Ride The Roller Coaster"
PSD Associates Case Study - "Ride The Roller Coaster"PSD Associates Case Study - "Ride The Roller Coaster"
PSD Associates Case Study - "Ride The Roller Coaster"
 
All new Ford Figo e Brochure
All new Ford Figo e BrochureAll new Ford Figo e Brochure
All new Ford Figo e Brochure
 
Renault Kwid eBrochure
Renault Kwid eBrochureRenault Kwid eBrochure
Renault Kwid eBrochure
 
A social cartography of student data: Moving beyond #StudentsAsDataObjects
A social cartography of student data: Moving beyond #StudentsAsDataObjectsA social cartography of student data: Moving beyond #StudentsAsDataObjects
A social cartography of student data: Moving beyond #StudentsAsDataObjects
 
Kohinoor presentation final
Kohinoor presentation finalKohinoor presentation final
Kohinoor presentation final
 
Class eight bangladesh & global studies content 03
Class eight bangladesh & global studies content 03Class eight bangladesh & global studies content 03
Class eight bangladesh & global studies content 03
 
Class 8 english lesson 2 introducing a table of contents
Class 8 english lesson 2 introducing a table of contentsClass 8 english lesson 2 introducing a table of contents
Class 8 english lesson 2 introducing a table of contents
 

Similaire à Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information Systems And Technology

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformationRick Bouter
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global PerspectiveJoseph M Bradley
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD InfrastructureMelissa Andrews
 
IOT in Enterprises
IOT in Enterprises IOT in Enterprises
IOT in Enterprises AuroIN
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsRaúl Castañón Martínez
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
 
Three Advantages of Implementing IoT in Business
 Three Advantages of Implementing IoT in Business Three Advantages of Implementing IoT in Business
Three Advantages of Implementing IoT in BusinessTeksun
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 

Similaire à Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information Systems And Technology (20)

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Finding the value in byod capgemini consulting - digital transformation
Finding the value in byod   capgemini consulting - digital transformationFinding the value in byod   capgemini consulting - digital transformation
Finding the value in byod capgemini consulting - digital transformation
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 
01 ondrej felix [režim kompatibility]
01   ondrej felix [režim kompatibility]01   ondrej felix [režim kompatibility]
01 ondrej felix [režim kompatibility]
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
IOT in Enterprises
IOT in Enterprises IOT in Enterprises
IOT in Enterprises
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Three Advantages of Implementing IoT in Business
 Three Advantages of Implementing IoT in Business Three Advantages of Implementing IoT in Business
Three Advantages of Implementing IoT in Business
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 

Plus de Vishrut Shukla

There's a bot for that! - Getting to Know the World of Conversational UI
There's a bot for that! - Getting to Know the World of Conversational UIThere's a bot for that! - Getting to Know the World of Conversational UI
There's a bot for that! - Getting to Know the World of Conversational UIVishrut Shukla
 
Transitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's GuideTransitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's GuideVishrut Shukla
 
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...Vishrut Shukla
 
Transitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's GuideTransitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's GuideVishrut Shukla
 
"There's a bot for that!" - The World of Conversational UIs and Chat Bots
"There's a bot for that!" - The World of Conversational UIs and Chat Bots"There's a bot for that!" - The World of Conversational UIs and Chat Bots
"There's a bot for that!" - The World of Conversational UIs and Chat BotsVishrut Shukla
 
Tablets in Education: Is India ready for their adoption?
Tablets in Education: Is India ready for their adoption?Tablets in Education: Is India ready for their adoption?
Tablets in Education: Is India ready for their adoption?Vishrut Shukla
 
A Study of Coffee Retail Cafes in India
A Study of Coffee Retail Cafes in IndiaA Study of Coffee Retail Cafes in India
A Study of Coffee Retail Cafes in IndiaVishrut Shukla
 
Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?
Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?
Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?Vishrut Shukla
 
A Study of Sales & Distribution Mechanisms of Hindi Cinema
A Study of Sales & Distribution Mechanisms of Hindi CinemaA Study of Sales & Distribution Mechanisms of Hindi Cinema
A Study of Sales & Distribution Mechanisms of Hindi CinemaVishrut Shukla
 
Recipe for Hindi Cinema Blockbuster: Research for Marketing Decisions
Recipe for Hindi Cinema Blockbuster: Research for Marketing DecisionsRecipe for Hindi Cinema Blockbuster: Research for Marketing Decisions
Recipe for Hindi Cinema Blockbuster: Research for Marketing DecisionsVishrut Shukla
 
Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...
Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...
Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...Vishrut Shukla
 
Blue Dart Express Delivery Services: Competition and Strategy
Blue Dart Express Delivery Services: Competition and StrategyBlue Dart Express Delivery Services: Competition and Strategy
Blue Dart Express Delivery Services: Competition and StrategyVishrut Shukla
 
Marketing IIMB as a Global MBA Destination for International Students: Market...
Marketing IIMB as a Global MBA Destination for International Students: Market...Marketing IIMB as a Global MBA Destination for International Students: Market...
Marketing IIMB as a Global MBA Destination for International Students: Market...Vishrut Shukla
 
Performance Drivers in Auto Mechanics - Managing People and Performance in Or...
Performance Drivers in Auto Mechanics - Managing People and Performance in Or...Performance Drivers in Auto Mechanics - Managing People and Performance in Or...
Performance Drivers in Auto Mechanics - Managing People and Performance in Or...Vishrut Shukla
 

Plus de Vishrut Shukla (14)

There's a bot for that! - Getting to Know the World of Conversational UI
There's a bot for that! - Getting to Know the World of Conversational UIThere's a bot for that! - Getting to Know the World of Conversational UI
There's a bot for that! - Getting to Know the World of Conversational UI
 
Transitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's GuideTransitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's Guide
 
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
Getting Started with Product Analytics - A 101 Implementation Guide for Begin...
 
Transitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's GuideTransitioning into Product Management - A Beginner's Guide
Transitioning into Product Management - A Beginner's Guide
 
"There's a bot for that!" - The World of Conversational UIs and Chat Bots
"There's a bot for that!" - The World of Conversational UIs and Chat Bots"There's a bot for that!" - The World of Conversational UIs and Chat Bots
"There's a bot for that!" - The World of Conversational UIs and Chat Bots
 
Tablets in Education: Is India ready for their adoption?
Tablets in Education: Is India ready for their adoption?Tablets in Education: Is India ready for their adoption?
Tablets in Education: Is India ready for their adoption?
 
A Study of Coffee Retail Cafes in India
A Study of Coffee Retail Cafes in IndiaA Study of Coffee Retail Cafes in India
A Study of Coffee Retail Cafes in India
 
Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?
Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?
Teaser Advertising - Why Do Brands Use Them & When Will They Be Successful?
 
A Study of Sales & Distribution Mechanisms of Hindi Cinema
A Study of Sales & Distribution Mechanisms of Hindi CinemaA Study of Sales & Distribution Mechanisms of Hindi Cinema
A Study of Sales & Distribution Mechanisms of Hindi Cinema
 
Recipe for Hindi Cinema Blockbuster: Research for Marketing Decisions
Recipe for Hindi Cinema Blockbuster: Research for Marketing DecisionsRecipe for Hindi Cinema Blockbuster: Research for Marketing Decisions
Recipe for Hindi Cinema Blockbuster: Research for Marketing Decisions
 
Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...
Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...
Development of Loyalty Program for Indigo - A Low Cost Indian Airline: Consum...
 
Blue Dart Express Delivery Services: Competition and Strategy
Blue Dart Express Delivery Services: Competition and StrategyBlue Dart Express Delivery Services: Competition and Strategy
Blue Dart Express Delivery Services: Competition and Strategy
 
Marketing IIMB as a Global MBA Destination for International Students: Market...
Marketing IIMB as a Global MBA Destination for International Students: Market...Marketing IIMB as a Global MBA Destination for International Students: Market...
Marketing IIMB as a Global MBA Destination for International Students: Market...
 
Performance Drivers in Auto Mechanics - Managing People and Performance in Or...
Performance Drivers in Auto Mechanics - Managing People and Performance in Or...Performance Drivers in Auto Mechanics - Managing People and Performance in Or...
Performance Drivers in Auto Mechanics - Managing People and Performance in Or...
 

Dernier

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Dernier (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information Systems And Technology

  • 1. Handheld Devices & BYOD: Are Enterprises There Yet? Term Paper by Team ‘Unhygienix’ Anusha Subramanian, Shadin Cornelio, Siddharth Shashidharan, Vishrut Shukla Management of Information Systems & Technology (MIST) (Term III - PGP 2012-14) Indian Institute of Management Bangalore Introduction The consumerization of IT has led to a shift in the IT culture of companies by making it more employeedriven and less reliant on IT departments, implying that consumer technologies are increasingly being used in the workplace, as opposed to specific enterprise IT solutions. The increase in faster, easier-to-use and better consumer devices has caused this shift by compelling employees to bring their personal devices to their workplaces as well. Sensing an opportunity to satisfy their employees’ desires of flexibility and mobility, a number of large corporates such as Cisco and IBM have become cheerleaders of the ‘Bring Your Own Device’ (BYOD) concept and have begun permitting employees to use their own smartphones, tablets and laptops on the corporate network. BYOD is increasingly touted to enhance the time spent by employees on work-related issues and facilitate more effective collaboration. Cisco has described this concept as “WorkYour-Way” with the vision of allowing employees to work on any device at any time and from any place. Limit Basic Advanced Environment requires tight controls Basic access for additional devices Any device, anywhere, enhanced security Any device, anywhere, anyone IT approved devices Broader device set Wide range of devices IT managed devices with mainly on-site access IT managed devices with on-site access Corporate and employee owned devices with full on-site / off-site access Wide range of devices Corporate and employee owned devices with full on-site / off-site access Custom native apps Enhanced services for Guest/customer devices All other devices prohibited on network Employee owned and Guest devices with Internet only Device-side security, Internet on Guest device Embrace Typical Use Cases Financial services firms restrict access to confidential financial data Educational institutions allow basic services to everyone (eg: email) Healthcare providers offer differentiated services based on role (eg: select corp data) Mobile sales enterprises offer videos and collaboration sessions Fig. 1: Different Levels of BYOD Adoption Scenarios (Reproduced from Cisco Bring Your Own Device - Device Freedom without Compromising the IT Network Public Whitepaper, April 18, 2012) However, BYOD is not a cakewalk when it comes to implementation and has its own share of issues that affect fundamental information security policies in organizations. According to a research study undertaken Handheld Devices & BYOD: Are Enterprises There Yet? Page 1of 13
  • 2. by Logicalis, around 17.7% of the employees surveyed claimed that their IT departments were uninformed of their usage of personal devices at the workplace, and 28.4% suggested that their IT departments preferred to actively ignore paying special attention to the IT consumerization trend despite being aware of it. This is set to change though as data security, featuring as the #1, #2 and #3 concern for top CIOs today has recently gained back the limelight thanks to high profile data breaches at firms like Yahoo! and LinkedIn. Unsurprisingly, more than 50% of the firms surveyed by Forrester Consulting reflect serious concerns about BYOD speculating whether adopting this phenomenon is a gateway to hell by opening a fatal can of worms for IT policy enforcers. There is however no doubt that BYOD is keeping everyone across the board busy and is a truly enterprisewide project engaging the engineering teams, application teams, security and compliance teams as well as executives and human resources personnel. Technical experts are busy ironing out the remaining wrinkles in the technology architecture. IT policy makers are debating about clear guidelines and best practices that they should adopt in order to prevent BYOD from slipping out of control. Business executives are weighing the predicted productivity improvements and revenue gains against the serious security challenges and careful change management to be undertaken when deciding to throw the switch in favour of BYOD. Notwithstanding, industry watchdogs and experts are busy debating whether BYOD is another one of those mere fads presently generating a lot of buzz at its peak of inflated expectation or whether it will persist and proliferate to change the way companies conduct business. Field Data For the purpose of gaining first-hand insights into the above mentioned topics, the authors studied world’s leading network equipment manufacturer Cisco Systems, Inc. - one of the early adopters and enthusiastic cheerleader of the BYOD trend. Cisco, which has applied the BYOD programme within its corporate organization for employees and is encouraging partners to follow suit as well, also offers BYOD solutions portfolio for clients under its ‘Borderless Network’ vision. The aim of the field research was to find out how mobile technologies fit into Cisco’s organizational philosophy, the current scale of handheld device usage/deployment in the organization, the design of the technology architecture, early signs of impact created by the adoption of tablets and BYOD in business terms, top management’s, IT policy makers’ and employees’ perspectives about the new trend, how the enterprise’s IT Policy has been modified to accommodate these changes, strategic and operational challenges being faced by the company in BYOD’s adoption and key takeaways for the future.  Executive Perspective: To get deeper insights from the topmost decision-making level regarding BYOD adoption, the authors interviewed Mr. Johnson Jose, Senior Director, Cisco I.T. in detail. According to Mr. Jose, the product companies are set to gain the most by shifting to employee-owned devices as besides Handheld Devices & BYOD: Are Enterprises There Yet? Page 2of 13
  • 3. saving IT support costs for the company, the boost in employee productivity translates into business profits without fail. The services companies that bill their clients based on the number of hours billed may see a contradiction with BYOD as tremendous increases in employee productivity may negatively impact the number of billed hours for such companies and hence, they may only support BYOD from the outset. Mr. Jose also mentioned that though the technology and security architectures are almost fully ironed out for a wide-scale BYOD deployment model, the biggest challenges of dealing with employee resistance to change and climbing a steep adoption curve still remain to be addressed as not all employees, especially at the senior level see value in changing the way they work daily with their devices. He stressed that consistency of user experience and alignment of changed policies with simple logical human behaviour will be critical to ensure the success.  IT Policy Maker Perspective: As part of the detailed field research undertaken, the authors conducted a personal interview with Mr. Kiran S. Narayan, I.T. Manager at Cisco Systems about the implementation and future of BYOD at Cisco. According to Mr. Narayan, stage-wise rollouts of pilot BYOD programmes are well underway in different parts of the organization beginning with the support for smartphones and tablets. The choice of devices is explained by the fact that these are the most widely used categories in electronic media apart from PCs and laptops. Cisco currently has over 100,000 end points that include employees’ personal devices being used for a broad range of work-related tasks. Again, Mr. Narayan stresses on the fact that from the corporate point of view, the motivation for implementing and encouraging BYOD is increased productivity, enhanced user experience and more flexibility for users, rather than savings in cost. According to Mr. Kiran, it is interesting to note that the growth in BYOD mirrors the trend in two other important areas – data usage and virtualization. Data consumption around the world has seen an explosive growth in the recent past due to better network infrastructure and connectivity. Cisco uses a thin client known as Virtual Exchange Information (VXI), an interface based on virtualization to provide highly secure connectivity to the company network from anywhere and on any supported device. In 2010, Cisco introduced its popular AnyConnect VPN Client, a secure remote login software that creates an encrypted connection from the user’s end device into the company network. Before a foreign device is granted access to the company network, Cisco IT first checks if the device conforms to a prerequisite set of features, known as a ‘posture’. This comprises of some basic software such as anti-virus package, basic security agent equipped with screening intelligence to name a few. Thereafter, device identity is established and credentials are verified. As Mr. Kiran pointed out, this is done because the company needs to know what type of device is being granted or denied access in order to avoid compromising on security of the network. The company is currently experimenting with different user bases to identify the best way in which BYOD can be introduced on a larger scale beginning with the laptops segment. However, even within Cisco, BYOD cannot be implemented throughout the company because the sensitivity of work varies from one area to another. Another issue that IT policy Handheld Devices & BYOD: Are Enterprises There Yet? Page 3of 13
  • 4. makers in Cisco are grappling with is the stark difference in the architecture and development cycles of different platforms running on handhelds such as iOS, Android and Windows. Mr. Kiran is quick in pointing out that while Apple has a relatively longer development period for each updated version of its iOS, Android versioning is much more rapid. Windows for the mobile platform is pretty nascent and faces several stability issues. This is demanding scaled up efforts from Cisco IT teams who are tasked with making access to company network available on these devices in a secure and consistent manner. Analysis of BYOD in Enterprises Drivers of the BYOD Phenomenon  Devices Lead BYOD’s Promise of Delivering ‘Beyond the Buzz’: The truth is that the BYOD trend does much more than only addressing some of operational issues which it is mostly perceived to resolve. It is about end users being able to use the computing and communication devices of their own choice whether purchased by the employer, purchased by the employee, or both. The fact that multiple devices exist today for multiple needs (refer to Fig. 1 for device sales) is widely believed to ultimately make way for a single device which will be used for all their computing and communication needs. However, most experts seem to disagree as there will be different devices best suited to some particular uses for example Fig. 2: PC & Non-PC Sales 2011 (in millions) (Source: Deloitte, 2011) laptops have larger screens, faster performance and support more applications which tablets and smartphones cannot deliver. The United States and India are already leading other countries in the percentage of knowledge workers using mobile devices (at nearly 70 %), and countries like China and Mexico are not far behind. This finding feeds positively into the BYOD phenomenon as it indicates that people are using multiple mobile devices, such as laptops, smartphones, and tablet computers, to help them accomplish their tasks. Supporting the above claim with some relevant numbers here, it is estimated that by the end of 2013, the number of mobile-connected devices will exceed earth’s population; whereas by 2017 the world will see over 10 billion mobile-connected devices i.e. nearly 1.4 mobile devices per person. Out of these, 86% will be handheld or personal mobile-ready devices and not surprisingly, the biggest gain in traffic share will come primarily from two areas: a) machine-to-machine (M2M) usage, fuelled by the emergence of the ‘Internet of Things’ and explosion of ‘big data’ (5% of all mobile connections in 2012, 17% in 2017); b) smartphones (16 % in 2012, 27% in 2017). The highest growth area will be handheld tablets growing at a CAGR of 46% followed by M2M at a CAGR of 36%. From an enterprise perspective, on an average, IT leaders expect the number of computing devices to rise from 2.3 per employee in 2012 to Handheld Devices & BYOD: Are Enterprises There Yet? Page 4of 13
  • 5. 2.8 in 2014. Table 1 lists the increase in device units and Type of Device Growth in Devices, 2012-2017 CAGR Growth in Mobile Data Traffic, 20122017 CAGR above estimates, one can argue that BYOD, presently climbing Smartphone 20% 81% up its technology lifecycle curve, will continue to stay at the Tablet 46% 113% Laptop 11% 31% M2M Module 36% 89% corresponding increase in the mobile data traffic on these devices. Based on the promising outlook established via the ‘peak of inflated expectations’ for quite some time, before dipping down to the ‘trough of disillusionment’ point, if at all in future. Cisco’s IBSG survey results confirm this as well since according to the survey, 42% of smartphones and 38% of Fig 3: Global Device Units and Mobile Data Traffic Growth (Source: Cisco VNI Mobile Forecast 2013) laptops used in workplaces are now employee-owned thus showing that BYOD, far from being an emerging trend, is already quite entrenched in enterprises.  Highly Collaborative Applications & ‘Network as a Platform’: The latest published Cisco Visual Networking Index (VNI) 2013 provides interesting insights about increasing IP traffic in the world. Global mobile data traffic grew 70% in year 2012 and reached 885 petabytes per month at the end of 2012, up from 520 petabytes per month at the end of 2011. To put things into perspective, global mobile data traffic in 2012 (885 petabytes per month) was nearly 12 times greater than the total global Internet traffic in 2000 (75 petabytes per month) and for the first time, mobile video traffic exceeded 50% of the entire traffic in 2012. Cisco further forecasts 11.2 exabytes per month of mobile data traffic by the year 2017 and these figures appear conservative by all estimates since they do not reflect the tablet and smartphone traffic that has largely remained on fixed corporate networks such as office WiFi’s etc. The concept of ‘Network as a Platform’ has already gained momentum in enterprises as work applications, pervasive mobility and new collaboration tools all use rich media, driving a large increase in the amount of video and multimedia traffic traversing the network. In addition to this, as more and more enterprise applications get exported to cloud-based infrastructure, network data traffic can only move in one direction, that of exploding growth. Exabytes per month Fig. 4: Worldwide Mobile Data Traffic Forecast (2010-2017) (Source: Cisco VNI Mobile Forecast 2013) Interestingly, a 2012 research conducted by Cisco points out that 47% of employees in 66% CAGR 2012-17 companies under the study were officially designated “mobile workers”, however a staggering 60% of employees actually use a mobile device for work. In India alone, the corresponding proportions are 51% and 69% respectively. Handheld Devices & BYOD: Are Enterprises There Yet? Page 5of 13
  • 6.  Overlap between Work and Personal Fuels into the User’s Motivation: Most enterprises are openly recognizing the fact that contrary to the prevalent view about work being a place where people go to, it is actually an activity which people do. Extended connectivity through secure mobile and remote access to the corporate network allows employees tremendous flexibility and increased productivity by blurring the line between designated personal and work time. Mobility allows friends, family, and colleagues to reach them at any time. Thus as employees often end up interweaving work and personal tasks, they probably do not want to carry and switch between personal and work devices and rather use the same device currently held in their hands to attend to all kinds of tasks including corporate work as well. In brief, today’s knowledge worker is never really “out of the office”. BYOD is attractive because strict lines of demarcation over what content can be accessed, downloaded, or used on a company-owned device are blurred on a device owned by the employee giving them great control by design. A major caveat to this, and a pretty serious one, however is that co-mingled data on the user devices may lead to security and privacy challenges, which will be explored further in the following discussions.  Management keeps productivity gains in mind and not cost savings: From primary discussions the authors have had with executives in corporates and based on the secondary literature already available on BYOD, it has been established that executives are seldom adopting this trend keeping only the resulting cost reductions in mind. As Deliotte’s CIO Matt Peers puts it succinctly, executives must never subscribe to that point of view by allowing themselves into a short-sighted, cost reduction mentality which, apart from being quite counterproductive, can be outright dangerous as well. While it may seem contrary to what BYOD was perceived to be – another one of the cost cutting measures by large corporates, it is found that while the cost of procuring, customizing, maintaining, servicing and disposing company-owned devices will definitely go down with this policy being around, the expense of application security, access authentication, backend infrastructure and regulatory compliance tends to increase. Realizing this trend, the top-of-the-mind return that corporate management is expecting from BYOD rollouts in their organizations is a boost in employee productivity (and therefore revenues) due to the choice and flexibility enabled by this policy. There are, however, mixed empirical results with respect to productivity gains caused by BYOD. A recent study conducted by business communications expert Sam H. DeKay concludes that the research does not convincingly demonstrate that BYOD improves the productivity of employee communications and other computing functions in an organization on its own. On the other hand, a 2012 survey of 202 BYOD decision-makers in enterprises conducted by Forrester Consulting in the United Kingdom, United States, France and Germany found that more than 80% of Handheld Devices & BYOD: Are Enterprises There Yet? Page 6of 13
  • 7. employees reported an increase in productivity due to BYOD as they could communicate more frequently with co-workers from anywhere. Therefore, corporate decision-makers should give careful thought to adopting a BYOD implementation if their primary rationale is to enhance workforce productivity. Additionally, there will always be certain industries like investment banking and defence, where the very nature of work will discourage the adoption of BYOD, primarily driven by the need for absolute security of data. Typical Use Cases for BYOD & Order of Effects Home Workers / Telecommuters are, by default, prime BYOD candidates, especially if they belong to the contract workforce. The freedom to use their own personal device can lead to increased productivity. Device level and network security needs special attention in case of telecommuters. Mobile Workers who travel most or all the time, often to client sites will be benefited if permitted to use their personal mobile devices or employer-provided devices at the client location. The most secure option for many of these workers is typically an encrypted VPNconnected secure device that accesses the virtual corporate Fig. 5: First-Order, Second-Order and Third-Order Effects of BYOD network of their employer. Ensuring a ‘no local data stored’ approach i.e. all data is fetched on-demand from the corporate server and is flushed out when the connectivity gets lost, leads to peace of mind for IT policy enforcers as a lost laptop or a smartphone does not post a security threat to the enterprise. Sales Professionals will largely benefit from BYOD as they can access data about the customers and transaction history via the corporate CRM on their handheld device anytime in the field. Permanent Employees who commute daily to office at times choose to take work home. Since they work at night, on weekends, during holidays, while on flights and in airport lounges, most such users prefer a handheld device they are familiar with. Here, BYOD comes to their rescue by allowing them to use their new breed of smartphones and tablets to connect securely to the company network. Since companyprovided devices though more expensive, are more secure and easier to remotely manage, BYOD’s successful implementation in each of the above use cases hinge heavily on addressing security and privacy concerns. Challenges and Risks with BYOD Adoption Experts and IT policy enforcers across the board believe that while many of the benefits of BYOD, such as letting users exercise their choice of using any device anywhere and anytime are accepted to add to employees’ satisfaction, productivity and business revenues, they are somewhat antithetical to the Handheld Devices & BYOD: Are Enterprises There Yet? Page 7of 13
  • 8. traditional IT requirements for strict security, device service and support. Some of the key challenges that may potentially turn BYOD into ‘Bring Your Own Demise’ are identified as follows:  Providing Device Choice and Support to Users: Traditionally, the IT team in organizations maintained a pre-determined list of approved workplace devices which employees could choose from, typically a standardized desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones for sales workers and mobile workforce. The BYOD adoption mandates IT to essentially support all kinds of user devices but keeping practicality in mind, it is a tough problem to solve. Handheld consumer devices are evolving so rapidly that it is impractical to pre-approve each and every brand and form factor. It is also somewhat impractical to expect IT organizations to have the same level of support for each and every device that employees may bring to the workplace. The policy designers are struggling to find a mid-way to keep supporting the BYOD vision to the farthest extent possible within the constraints of the practical limitations of IT support and implementation. Presently, most IT decision-makers have established, at a macro level, the types of devices they will support on their network based their decision on unacceptable security readiness or other user experience factors. However, the support for newer devices keeps getting added from time to time. As far as servicing the user devices are concerned, most organizations have uniformly favoured the adoption of self-support models with very limited or no specific device-level support from corporate IT’s side.  Maintaining Secure Access to Corporate Network: The primary success criteria of any BYOD implementation is to ensure security is not sacrificed. IT teams are struggling to establish the minimum security baseline that any device must meet to be used on the corporate network, including WiFi security, VPN access and perhaps add-on software to protect against malware. In addition, due to the wide range of devices, it is critical to be able to identify each device connecting to the network and authenticate both the device and the person using it. IT department needs to minimize the risk of data loss or incursion. Securing corporate data, applications, and systems is essential for any BYOD strategy.  On-Boarding of New Devices: Bringing in a new user device onto the network for the first time should ideally be simple, self-service with minimal or zero IT intervention and should be clientless i.e. without the requirement of any pre-installed software on the new device. All IT should be able to do is push updates to the on-boarded devices as the policy mandates.  Enforcing Company Usage Policies: Adoption of BYOD must provide a way to enforce policies in line with explicit business requirements as well as regulatory compliance needs depending upon the industry. This can be challenging on a wide flavour of consumer devices like tablets and smartphones. For example, access to the Internet, peer-to-peer file sharing and the usage of specific applications may Handheld Devices & BYOD: Are Enterprises There Yet? Page 8of 13
  • 9. be subject to different policies depending on whether the users are on their personal time and network or whether they are accessing the corporate network during work hours. The growing usage of unapproved collaboration tools on user devices for corporate work is a serious concern as well.  Protection of Data and Loss Prevention: In industries bounded by strict regulations, the IT department needs to show compliance is possible with BYOD adoption, which can be more challenging, compared to when corporate-owned and managed devices were involved. Cloudbased file sharing and storage services may be convenient for personal data of employees, but can be potential sources of leakage and information breaches for confidential corporate data. Mobile device management (MDM) products and services often come across as the obvious, reflexive response to the need for more secure mobile computing, but a growing number of experts now agree that the answer to BYOD is not to control the device (which was the case for company-owned devices), but to control the data. Mobile Application Management (MAM) and software-based authentication is the preferred approach among IT departments now.  Device Management and Visibility on the Network: Many of the handheld devices support multiple connectivity modes ranging from wired and wireless Ethernet (Wf-Fi) to 3G/4G mobile networks. Switching between these different modes during a session is common and IT needs to ensure visibility of all the devices on the corporate network and beyond taking this into account.  Ability to Revoke Access Privileges for Devices: Under unexpected circumstances during the lifecycle of a device or employee, it may become necessary to terminate access to the corporate network and data from the user’s device. This becomes a common concern in case of a lost or stolen device, employee termination or even an employee changing roles within the company. Using MAM, IT department needs to ensure they have the ability to immediately revoke access granted to any device and possibly wipe some or all of the data and applications remotely from the device, if the situation demands so.  Managing the Increase in Connected Devices: The increasing number of devices connected to the network, most likely with each employee having more than one device simultaneously connected, can lead to IP address starvation as most legacy IP address plans were created under the assumption of fewer devices. This will demand that the IT department hastens the need for IPv6 deployments both inside the enterprise network and at the network edge via to allow secure remote connections. Handheld Devices & BYOD: Are Enterprises There Yet? Page 9of 13
  • 10.  Keeping the Implementation Simple and Accessible for Users: Different brands and form factors of devices may require different steps for on-boarding and getting connected to the network. The security policies differ depending upon how and where the user is trying to connect. For example, corporate WiFi may require only credentials, whereas connecting through a public wireless hotspot may mandate the use of a VPN connection and increased security steps. A BYOD solution needs to be as simple as possible for users, should be able to provide a consistent experience across device no matter where and when users are connecting from. IT must ensure critical tasks such as mobile printing should be supported from each of the wide range of user devices to guarantee a seamless experience. Policy Prescriptions and Best Practices for BYOD Adoption To address the challenges and complexities identified above, the authors prescribe the following IT policy design and approach for BYOD rollout in any organization: deployments are easy with users who only need low levels of IT support, possibly using self-support communities to share best practices. Deployments may be more difficult with users who have high mobility needs but also require high support levels, such as executives. Conducting such an analysis will help in understanding the entitlement policies and support models and may prevent cost overruns in the IT budget.  Low Need for Support High  Understanding User Segments & Needs: BYOD Admin/Clerical Call Center/Support Finance Executives Sales Reps Healthcare Worker IT Support Educator/Trainer Technical Support Engineers IT Staff Technical Sales Low Need for Mobility High Fig. 6: User Segments & Needs (Reproduced from Cisco Whitepaper) Selecting a BYOD Adoption Strategy: The IT decision-makers need to select one out of the four levels of adoption strategies as described in Fig. 1 earlier based on their business requirements and risk profile of exposing users to BYOD policies.  Lost or Stolen Device Policy: The IT policy must choose one out of the different solutions with varying degrees of capabilities to reach out to a device remotely and destroy data or applications to ensure they remain confidential.  Choosing the Right Application & Data Strategy: Adopting the right approach towards serving data and content on the wide array of user devices under BYOD is perhaps the most critical decision the IT has to make. The current architecture allows the choice from among the following options: Handheld Devices & BYOD: Are Enterprises There Yet? Page 10of 13
  • 11. Native Application Native Application Data Centre HTML Layer Native Application Data Centre Web Browser Desktop Virtualization Client Native Application Desktop Virtualization Client Native - Local data on device - Maximum performance - Native device experience - Offline possible Browser - Local data on device - Portable to many devices - Browser experience - Always connectivity required Virtual - No local data on device - Maximum security - Translated experience - Always connectivity required Data Centre Fig. 7: Application & Data Mode Choices in a Typical BYOD Deployment (Reproduced from Cisco Bring Your Own Device - Device Freedom without Compromising the IT Network Public Whitepaper, April 18, 2012)  The Human Factor - User Cooperation & Change Management: Under BYOD, where the real benefit for the employee comes into play is the concept of working your way (WYW) as Cisco calls it, but often there are cultural and generational mindsets that make it difficult for employees to see value in this change. CEOs, CIOs and executives in organizations need to dig deeper to find out if their employees are culturally ready and mature enough to adopt the WYW life for success. The change leaders need to understand and communicate the benefits of BYOD clearly: a) great place to work; b) work-life balance; c) reputation; d) employee loyalty and turnover and e) long term socio-economic impact of adopting a more flexible work style. Change management needs to be carried out in a careful manner to avoid alienation of older employees who may not see much value in moving away from the current model of work owing to a variety of reasons like loss of dedicated space, disturbances from family, out-of-pocket costs, socializing nature vs isolation, productivity, change in management style and company culture. Handheld Devices & BYOD: Are Enterprises There Yet? Page 11of 13
  • 12. Conclusion Old Wine in a New Bottle? The authors conclude that BYOD is not a new concept altogether. For years now, there have been a minority of disgruntled users, employees who cannot abide by company-prescribed devices. Mac users, for example, have always fought against the predominance of Windows laptops at work, claiming they hinder productivity. For an entire generation, now in their thirties and beyond, the primary means of content consumption was the PC/Mac, followed by the laptop. Naturally, these evolved to be fullfledged productivity enhancing devices, to the point where the idea of doing any work without a laptop became inconceivable. However, a paradigm shift has been observed in the way the next generation of employees are perceiving handhelds. For this new generation, the idea of demarcating work and their private life seems unnecessary and therefore, they expect to be able to surf the web, play games, connect to their office workstations, text, chat and e-mail on any and all of their devices. This is the demographic that is primarily going to drive BYOD adoption in companies, as they try to engage with employees and provide them with a flexible work environment. BYOD as a Source of Competitive Advantage: In a stark difference when compared to the previous cycle of smartphone adoption by enterprises, this time, the CIOs across the board are thinking long-term by talking about BYOD as a source competitive advantage - in enabling retention of the best talent and employee satisfaction and in higher productivity, allowing work from anywhere, on any device. In this endeavour, many companies are actively developing apps and endpoint protection services for tablets and smartphones. Some companies are also trying to pre-empt new releases of phones (like the iPhone 5), so that users can have a seamless transition. In public forums and site meetings, CIOs are making all the right noises about empowering employees and reduced controls, banking on improved productivity to pay off their investments in this early adoption of this new trend. This optimism surrounding BYOD, however, needs to be supported wholeheartedly by IT departments by finding ways to efficiently provide secure connectivity and consistent user experience across the ever-growing pool of devices with different form factors and brands. How will the Future Evolve? On a final note, the authors speculate tthe road ahead and what BYOD can make possible in the long term. Globally, 89% of IT leaders from both enterprises and midsize companies support BYOD in some form and 69 % view BYOD “somewhat” or “extremely” positively. Companies are slowly developing a vision for BYOD in the workplace which ties into their long term strategy, of which telecommuting may become a habit for a majority of employees. The world could be at the cusp of a breakthrough – one where companies break out of cubicles and mostly fixed office hours to become truly ‘virtual enterprises’. The transformative benefit of BYOD lies in employee-driven innovation — by allowing employees to decide how, when, and with which tools work is done, adopters of BYOD can potentially unlock the next wave of value. Rather than rushing in for an unplanned deployment in their organization, by fostering BYOD with proper management policies and strong governance model, companies can harness a latent and potent source of gaining competitive advantage over others in the business arena. Handheld Devices & BYOD: Are Enterprises There Yet? Page 12of 13
  • 13. References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Mobile-Friendly Workplaces, Lev-Ram, Michal, Fortune; 8/13/2012, Vol. 166 Issue 3 Gartner: Enterprises Must Adopt Tablets Early, Channel Insider; 4/6/2011 Business Embraces Tablets - With Caution, Nicholas Kolakowski, eWeek, 10/3/2011 BYOD Finds Increasing Support Among Businesses, Nathan Eddy, eWeek, 1/9/2013 Cisco ConnectedWorld Technology Report, Published by Cisco Systems Inc., 2011 BYOD: Enabling The Chaos, Gordon Thomson, Cisco Security EMEA Article The iPass Global Mobile Workforce Report (Q4 2012), iPass Inc. 2012 BYOD: OMG! or A-OK?, SC Magazine: For IT Security Professionals, Sept/Oct 2012 Are you ready for the BYOD yet?, David Raths, T.H.E. Journal, May 2012 Study: IT Saying Yes To BYOD, ‘the network’ - Cisco’s Technology News Site, 5/16/2012 IT Consumerization: When Gadgets Turn Into Enterprise IT Tools, MIS Quarterly Executive, Sept. ’12 It Shift to Tablets – Have You Prepared?, Puneesh Chaudhry, SiliconIndia, July 2012 Visual Networking Index – IP Traffic Chart, Cisco Visual Networking Index BYOD: A Global Perspective - Harnessing Employee-Led Innovation, Cisco Internet Business Solutions Group Horizons (Survey Report), Joseph Bradley, Jeff Loucks, James Macaulay, Richard Medcalf, Lauren Buckalew, 2012 For BYOD Best Practices, Secure Data, Not Devices, Thor Olavsrud, ComputerWorld Article BYOD (Bring Your Own Device) Policies Affect Everyone, Peter S. Vogel, 5/18/2012, Link Enterprise Security Challenges in the Emerging BYOD Era, CMR Research, Link Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017, Link Bring Your Own Device – Agility Through Consistent Delivery, PWC Advisory Services Report Cisco Bring Your Own Device - Device Freedom without Compromising the IT Network Public Whitepaper, 4/18/2012 Handheld Devices & BYOD: Are Enterprises There Yet? Page 13of 13