• Share
  • Email
  • Embed
  • Like
  • Private Content
BYOD Lessons Learned Thus Far

BYOD Lessons Learned Thus Far






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    BYOD Lessons Learned Thus Far BYOD Lessons Learned Thus Far Document Transcript

    • BYOD: Lessons Learned (Thus Far) Focus Research ©2012 All Rights Reserved
    • BYOD: Lessons Learned (Thus Far)Today’s workers are tech-savvy, mobile, and always-on, and they are increasingly on the move, whetherroaming about on a corporate campus, visiting a branch office, working on the road, or doing their jobfrom a home office. From the millennial masses up through the C-suite, employees are using personaltechnology—be it laptops, tablets, smartphones, or cloud computing services accessing their companies’networks—at work, fueling the Bring Your Own Device (BYOD) trend. It’s generating a lot of buzz aboutBYOD, and depending on who’s doing the talking, conversations tend to center around productivity(end-users), security/privacy (CIOs and IT departments), or cost (finance folks).SummaLogic’s Robert Keahey chummed the BYOD waters recently at focus.com when he wrote: “We’rea couple of years into this new paradigm, and with the use of SaaS, cloud-based integrated businesssuites and digital supply chains on the rise, we should step back and see what we’ve learned. Has BYODhelped or hindered your business model? Has IT been able to respond to this challenge/opportunity? …What are your experiences (or those of the companies with which you work)? Success stories? Horrorstories?”BYOD class is now in session…Jeff Gullang, controller at FiveCubits, is all about security and spelling out the BYOD rules and regulationsfor employees. Gullang stresses that BYOD users must be told that “even though it is your device, youare still accessing company property...and possibly the company is paying for the service that allows youto access the network; BB server, MS Exchange, etc. When the employee is no longer with the company,the company has the right to secure their property. It could be trade secrets, customer lists, or othersensitive documents.”To achieve that level of security, Gullang suggests removing the application or sensitive information fromthe device—but warns that “depending how this is done, it could cause personal data to be lost; pictures,music, etc. Many companies are requiring employees to sign a document that spells this out.” It’s a “grayarea if the company is not paying for the data services,” he surmises, “but I think this would hold up in lawif they do.”Anders Trolle-Schultz, managing partner at SaaS-it Consult, prefers to accentuate the positive (andsuggests that companies stop focusing on the negative): “Instead of focusing on…all the obstacles, letus look at what we really are trying to achieve. Because what we are trying to achieve is actually ‘Give theuser the same user-experience as they have as a consumer.’ It’s all about the GUI/NUI, and that doesn’thave to be with a focus only on the device itself. If Microsoft is able to convince consumers to move to theBYOD: Lessons Learned (Thus Far) Focus Research ©2012 2
    • new Metro—oops, sorry—Windows 8 look (and enterprises follow), the need for BYOD will be less, as thecross-platform experience will be similar, whether you use a phone, tablet, laptop or PC. Most importantlywill be the touch capability.”Finally, Justin Pirie, cloud strategist at Mimecast, suggest that a methodic, systematic approach is the bestway to keep BYOD concerns from getting blown out of proportion. Pirie echoes Trolle-Schultz’s “give thepeople what they want” sentiment, saying “What are users wanting?” He points to research that showsBYOD users most often want mail, contacts, and calendars. “Is that such a big deal? I don’t think so.Especially when, out of the box with Exchange 2010, you can enforce a pin lock and perform a remotewipe on the device.” If your company needs more granular control of devices, Pirie recommends MobileDevice Management (MDM) solutions, but warns “you need to know exactly what you’re trying to achievebefore you deploy these solutions.”The real challenge, Pirie thinks, isn’t the users or the devices. The issue of control is at the heart ofBYOD concerns: “The real challenge here is for traditional IT folks, as it further breaks their ability tocontrol everything, just like SaaS/cloud. But control does not necessarily equal security, as many securitybreaches show. What is essential is we understand the risks and put controls against them.”What effect is BYOD having on your business? Has your corporate data been compromised? Hasproductivity been boosted or busted? Have business software providers (Oracle, SAP, Salesforce, et al)adapted their products to your satisfaction? Share your wins, worries, and losses in the comments. Alec Wagner is a writer, editor, custom content specialist, and content marketing professional. A former managing editor of infoworld.com, he has trained his eye on the enterprise technology space for more than a dozen years. A longtime digital nomad, he divides his time between San Francisco and the South of France. He remembers to thank The Cloud daily for enabling his globetrotting ways. Mr. Wagner also enjoys lively debates about how warring tribes (be it business vs. IT, dev vs. ops, or sales vs. marketing) can find ways to work together better. He is of the opinion that the old chestnut, “There’s no ‘I’ in ‘team,’ ” is quite hackneyed, yet altogether true.BYOD: Lessons Learned (Thus Far) Focus Research ©2012 3