2. Significance of BYOD is expected to increase further in the coming years on
account of increased awareness of its positive impact on organizational productivity
Source: News Articles
Note: Figures between 2013 and 2014 are estimated based on MarketsandMarkets projection of growth rate of 26% during the period
0
50
100
150
200
250
300
2013 2014 2015 2016 2017 2018 2019
InUSDBn
BYOD Market Growth
CAGR:
26%
Market Trends
• Growing proliferation of smartphones and tablets,
coupled with the preference to use a single device, is
expected to fuel growth
− Smartphones were the most widely used BYOD devices
accounting for the largest market share in 2013.
− Although notebooks are also used to a large extent, they
are expected to exhibit slower growth, compared with
tablets
• Reduced hardware/device costs along with the use of
cloud-based solutions are expected to favorably impact
BYOD implementation.
− The financial/insurance and health care markets have
been among the active adopters.
• North America leads the market accounting for 34.7% of
the global market share in 2013; expected to remain the
largest regional segment over the next six years.
• Adoption in emerging markets is expected to remain high
primarily attributed to relatively lower provision rates of
corporate mobile devices in these regions, coupled with
the high degree of comfort and flexibility of individuals in
working during traditional downtime.
− BYOD demand in the Asia-Pacific region is expected to
grow at the fastest rate of 20.6% from 2014 to 2020.
“About half of the world’s companies will enact
BYOD (bring your own device) programs by 2017
and will no longer provide computing devices to
employees. Only 15% of companies will never
move to a BYOD model, while 40% will offer a
choice between BYOD and employer-provided
devices.”
- Gartner analyst David Willis
Source: MarketsandMarkets*
3. Adoption levels of BYOD seems to be more prevalent in the high growth emerging
markets than in mature markets
0% 20% 40% 60% 80% 100%
Brazil
Russia
India
South Africa
UAE
Malaysia
Singapore
Japan
Australia
Belgium
France
Germany
Italy
Spain
Sweden
UK
US
BYOD Adoption by Major emerging and
mature markets
Average adoption
in mature
markets: 44.4%
Average adoption
in emerging
markets: 74.9%
Source: Ovum Survey(N= 3,726 consumers across 17 countries)
Adoption Trends
1
Preference for BYOD among emerging markets is
primarily driven by two key factors
− Lower rate of corporate mobile handset and tablet
provision in these markets, leading those who feel they
need a mobile device to help with their job to use their
own
− Higher comfort level with mixing work and personal life
than seen among employees in more mature markets
Employees in high growth markets show greater desire
to access corporate data to be able to execute their job
better compared to mature markets
2
Employees in both emerging and mature markets are
preferring single device for work and personal activities
− Preference for single device is higher in high growth
markets compared to mature markets
3
IT Departments are acknowledging the BYOD adoption
and are encouraging use of personal devices and
enabling job done
− Although mature markets don’t see the highest level of
BYOD, IT organizations are readying themselves for the
next step in the development of an enterprise mobility
strategy.
4
Source: BYOD: an emerging market trend in more ways than one – Ovum, Q4 2012 BYOD survey
4. Business benefits in the form of cost savings and improved employee productivity
outweighs the data security challenge posed by BYOD
Source: News Articles
ChallengesDrivers
• Adoption of smartphones, tablets and notebooks
backed by improving network connectivity
• Ability of IT to introduce new network components
that assist in identifying devices running on Mac OS,
iOS and Android, and enforcing network access
privileges
• Cost savings coupled with increasing employee
productivity and satisfaction
• Loss and unauthorized access to data
• Ability to understand the implications of personal
devices, the type of information that can be stored and
what is expected of them to meet pre- and post
authentication requirements
• Ability to meet regulatory requirements
• Tracking and monitoring devices by IT could lead to
privacy issues
In 2013, Symantec conducted a survey of 236 attendees asking how their company is addressing BYOD, including
risks, challenges, polices, usage and management of mobile devices. While most organizations allow employees to use
personal mobile devices for business purposes, they accepted that doing so will likely result in a mobile
security incident. Survey respondents clearly stated that the use of BYOD is worth the risk, but that they need
technology to enforce policies and protect their organizations from mobile security incidents
5. The Financial Services and Healthcare sectors are the most active adopters
backed by strong BYOD support policies
Sector Adoption
Level
BYOD Adoption: Challenges and Benefits
Financial
Services
High
• Security is critical for implementation of the BYOD market
• Benefits include:
− Greater collaboration between various parties on-the-move
− Keeping a better track of daily process workflows
Healthcare
High
• Complying with regulations such as HIPAA and HITECH in addition to data security
continues to be the concern area
• Sector is one of the largest adopter of BYOD as it helps to:
− Do more clinical work on mobile devices
− Communicate directly with patients' smartphones
Manufacturing
Medium
• Lack of clear BYOD and related security policies is the key roadblock for adoption
• BYOD provides manufacturing sector with:
− Greater operational excellence
− More agile supply-chain system
Retail
Medium
• Though adoption levels are not too high, the trend is picking up gradually due to the
perceived benefits of BYOD including:
− Better customer service
− Decline in procurement and hardware costs
Public Sector
Medium
• Concerns over security and privacy prevails, however adoption continues to gain traction.
• BYOD adoption helps in:
− Cost-savings on account of lesser documentation
− Increase in productivity (better reporting, and process monitoring)
Source: BYOD adoption across Verticals – HP Blog
6. Top five leading practices in implementing a BYOD policy
Source: News Articles, Citrix White Paper on Best Practices to BYOD simple and secure
Eligibility
Criteria
• Before implementation of the BYOD policy, its important that organization must make it clear who in the
system is allowed to use personal devices, whether on an ad hoc basis to supplement a corporate endpoint,
as a permanent replacement for a corporate device or anything in between
• Policies need to be more than IT rules – it should take also take into account issues associated with HR
(employee terminations), Legal (compliance), and Security (sensitive information personal and corporate)
Types of
Devices
Allowed
• Organization needs to ensure what device platforms and OS versions it wants to support and accordingly
needs to make sure the mobile devices it is allowing are equipped with the required features.
• It should also consider the types of services it wants to offer on the device and whether it will differ for
specific work groups, user types, device types and network utilized
Password
Protected
• Organization needs to ensure that all the devices are password protected and accordingly decide how
complex the passwords should be and at what duration should it force the user to change the password
• The password policy should clearly define the required password length, complexity, required frequency of
change, failed attempts consequences, and penalties for not following these regulations.
Security and
Compliance
• Organization needs to implement policies to disable printing or access to client-side storage such as local
drives and USB storage
• Users should ensure that antivirus/anti-malware software is appropriately installed and updated on their
endpoint
• Users need to be aware that they are required to notify IT when their device is lost so the device passwords
can be remotely reset or wiped.
Device Support
and
Maintenance
• Organization’s BYOD policy should spell out explicitly how various support and maintenance tasks will be
addressed and paid for
• When a personally-owned device replaces a corporate endpoint, there may be a higher expectation of IT
support, however it should be defined narrowly to avoid exposing IT to greatly increased complexity and
workload