SlideShare a Scribd company logo
1 of 2
Download to read offline
21/07/2015 Bringing BYOD to your enterprise
http://searchmobilecomputing.techtarget.com/tutorial/Bringing­BYOD­to­your­enterprise?vgnextfmt=print 1/2
SearchMobileComputing.com
Bringing BYOD to your enterprise
By Michael Brandenburg
A bring your own device (BYOD) strategy for enterprises can be a winner for both users and
administrators. But switching to BYOD requires more than throwing open the barn doors and letting
employees buy whatever device they want. IT still needs to manage and secure the data on mobile
devices, whether they are owned by an enterprise or user.
BYOD brings flexibility to enterprise mobility
In more traditional mobility deployments, the enterprise itself was responsible for all facets of the
mobile device, including purchasing, its associated voice and data plans, as well as managing the
device assets. The IT department would track what device was assigned to each user and would be the
clearinghouse for any device replacement or upgrades. Essentially, IT treated mobile devices in the
same way that it did other IT assets like laptops or printers.
Consumers, however, are embracing smartphones and tablet devices as ways to stay personally
connected. This has led to a two­device dilemma, with many enterprise users carrying both a personal
and work device with them. The bring your own device movement is partially a solution for this
dilemma, enabling users to carry a single device for both business and personal use.
Define financial liability for BYOD
Enterprises may see users who are willing to pay for their own mobile devices and services as a cost
savings boon, but careful planning and thought should go into integrating BYOD into a mobile
strategy. In fact, any corporate mobility policy, whether it includes BYOD provisions or not, should
delineate corporate and individual responsibility for mobile devices.
Many enterprises choose a BYOD strategy that requires users to pick up the tab for the mobile device
and voice and data service, while reimbursing employees for a fixed portion of the charges, said Samir
Sakpal, industry manager and senior analyst for Frost & Sullivan. This approach is particularly
appealing to budget­conscious enterprises, as it offloads most of the wireless telecom expenses to the
user.
Other enterprises leverage their existing corporate pricing and pooled minute plans, while allowing
mobile users to choose and purchase their own devices. The enterprise still pays the charges, but this
approach allows employees to make purchase and upgrade decisions themselves. Enterprises can also
continue to leverage telecom expense management (TEM) solutions to manage their monthly wireless
costs, while allowing IT to get out of the process of device procurement.
BYOD still requires mobile device management
Shifting users to a BYOD strategy does not absolve IT from responsibility for mobile device
management, warned Philippe Winthrop, managing director at the Enterprise Mobility Foundation. “It
doesn’t matter who is paying for the mobile device, IT will still have to manage that device as a
corporate asset,” said Winthrop. Companies will need tools to support mobile devices, including tools
for mobile device management (MDM), mobile security and mobile application management.
21/07/2015 Bringing BYOD to your enterprise
http://searchmobilecomputing.techtarget.com/tutorial/Bringing­BYOD­to­your­enterprise?vgnextfmt=print 2/2
Legacy enterprises’ mobility deployments were often homogenous, relying on infrastructure such as
BlackBerry Enterprise Server (BES) to support a fleet of BlackBerry devices. The BES rolled all of
these mobile management functions into a single software platform. Unfortunately, no single platform
currently exists for the heterogeneous mobile environment created by a BYOD strategy.
Also, enterprises will likely adopt mobile enterprise application platforms (MEAP) to support native
mobile versions of custom enterprise applications. Overall, they will have to adopt a mashup of
multiple products to achieve an acceptable level of security and compatibility for a BYOD mobile
strategy.
As many large organizations develop their mobile device strategy, they are discovering that the
upfront cost savings that a BYOD strategy offers is erased by the costs of managing a heterogeneous
mobile deployment. Many companies are rethinking the BYOD approach to mobility by giving users
limited choice, Sakpal said. About 20% of the most highly mobile enterprises choose a limited
number of platforms to support and let their users choose from that list.
15 Jul 2011
All Rights Reserved, Copyright 2003 ­ 2015, TechTarget | Read our Privacy Statement

More Related Content

What's hot

Thinfilm Electronics Corporate Presentation Smarter Everyday
Thinfilm Electronics Corporate Presentation Smarter EverydayThinfilm Electronics Corporate Presentation Smarter Everyday
Thinfilm Electronics Corporate Presentation Smarter EverydayThinfilm - Printed Electronics
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemicLora Berr
 
Top 5 blockchain platforms for digital marketing
Top 5 blockchain platforms for digital marketingTop 5 blockchain platforms for digital marketing
Top 5 blockchain platforms for digital marketingBlockchain Council
 
Chapter 04
Chapter 04Chapter 04
Chapter 04leesyl
 
Different Types and Forms of Innovation
Different Types and Forms of InnovationDifferent Types and Forms of Innovation
Different Types and Forms of InnovationMotaz Agamawi
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Recent Developments in Information Management
Recent Developments in Information ManagementRecent Developments in Information Management
Recent Developments in Information ManagementYasar Tonta
 
Digitization connectivity and marketing
Digitization connectivity and marketingDigitization connectivity and marketing
Digitization connectivity and marketingShruti Dubey
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaborationSvetlana Belyaeva
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwCarolineFlamand
 
Capturing Value from The Next 10 Billion Devices
Capturing Value from The Next 10 Billion DevicesCapturing Value from The Next 10 Billion Devices
Capturing Value from The Next 10 Billion DevicesPaul Brody
 
Secure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlSecure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlCapgemini
 

What's hot (17)

Thinfilm Electronics Corporate Presentation Smarter Everyday
Thinfilm Electronics Corporate Presentation Smarter EverydayThinfilm Electronics Corporate Presentation Smarter Everyday
Thinfilm Electronics Corporate Presentation Smarter Everyday
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic
 
Top 5 blockchain platforms for digital marketing
Top 5 blockchain platforms for digital marketingTop 5 blockchain platforms for digital marketing
Top 5 blockchain platforms for digital marketing
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Different Types and Forms of Innovation
Different Types and Forms of InnovationDifferent Types and Forms of Innovation
Different Types and Forms of Innovation
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Recent Developments in Information Management
Recent Developments in Information ManagementRecent Developments in Information Management
Recent Developments in Information Management
 
Digitization connectivity and marketing
Digitization connectivity and marketingDigitization connectivity and marketing
Digitization connectivity and marketing
 
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIOOvum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
Ovum_whitepaper_The_Intelligent_Network_and_the_Future_CIO
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lw
 
Capturing Value from The Next 10 Billion Devices
Capturing Value from The Next 10 Billion DevicesCapturing Value from The Next 10 Billion Devices
Capturing Value from The Next 10 Billion Devices
 
Secure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of controlSecure journey to the cloud. A matter of control
Secure journey to the cloud. A matter of control
 

Viewers also liked (14)

Human2.3
Human2.3Human2.3
Human2.3
 
Formato de notas colmayor
Formato de notas colmayorFormato de notas colmayor
Formato de notas colmayor
 
NSRF Training Certificate
NSRF Training CertificateNSRF Training Certificate
NSRF Training Certificate
 
4to bas oa2
4to bas oa24to bas oa2
4to bas oa2
 
Heavy Rain
Heavy RainHeavy Rain
Heavy Rain
 
Edwin pacasira fase_1
Edwin pacasira fase_1Edwin pacasira fase_1
Edwin pacasira fase_1
 
Health & Wellness
Health & WellnessHealth & Wellness
Health & Wellness
 
AMUTranscript2
AMUTranscript2AMUTranscript2
AMUTranscript2
 
R 105
R 105R 105
R 105
 
Competencias informacionales tarea 5
Competencias informacionales tarea 5Competencias informacionales tarea 5
Competencias informacionales tarea 5
 
el amor
el amorel amor
el amor
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Recce of shoot
Recce of shootRecce of shoot
Recce of shoot
 
Acta15
Acta15Acta15
Acta15
 

Similar to BYOD Requires MDM for Security and Management

Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyInfo-Tech Research Group
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldKévin CÉCILE
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Wp byod
Wp byodWp byod
Wp byodJ
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderOKTOPUS Consulting
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022Bernard Marr
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsMasaf Dawood
 

Similar to BYOD Requires MDM for Security and Management (20)

Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Consider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategyConsider byoc as part of desktop as service strategy
Consider byoc as part of desktop as service strategy
 
Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Security that works
Security that worksSecurity that works
Security that works
 
Wp byod
Wp byodWp byod
Wp byod
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Viability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programsViability of bring your-own-computer BYOC programs
Viability of bring your-own-computer BYOC programs
 

BYOD Requires MDM for Security and Management