SlideShare a Scribd company logo
1 of 7
BYOD Market
Prepared by Linson Kolanchery
Significance of BYOD is expected to increase further in the coming years on
account of increased awareness of its positive impact on organizational productivity
Source: News Articles
Note: Figures between 2013 and 2014 are estimated based on MarketsandMarkets projection of growth rate of 26% during the period
0
50
100
150
200
250
300
2013 2014 2015 2016 2017 2018 2019
InUSDBn
BYOD Market Growth
CAGR:
26%
Market Trends
• Growing proliferation of smartphones and tablets,
coupled with the preference to use a single device, is
expected to fuel growth
− Smartphones were the most widely used BYOD devices
accounting for the largest market share in 2013.
− Although notebooks are also used to a large extent, they
are expected to exhibit slower growth, compared with
tablets
• Reduced hardware/device costs along with the use of
cloud-based solutions are expected to favorably impact
BYOD implementation.
− The financial/insurance and health care markets have
been among the active adopters.
• North America leads the market accounting for 34.7% of
the global market share in 2013; expected to remain the
largest regional segment over the next six years.
• Adoption in emerging markets is expected to remain high
primarily attributed to relatively lower provision rates of
corporate mobile devices in these regions, coupled with
the high degree of comfort and flexibility of individuals in
working during traditional downtime.
− BYOD demand in the Asia-Pacific region is expected to
grow at the fastest rate of 20.6% from 2014 to 2020.
“About half of the world’s companies will enact
BYOD (bring your own device) programs by 2017
and will no longer provide computing devices to
employees. Only 15% of companies will never
move to a BYOD model, while 40% will offer a
choice between BYOD and employer-provided
devices.”
- Gartner analyst David Willis
Source: MarketsandMarkets*
Adoption levels of BYOD seems to be more prevalent in the high growth emerging
markets than in mature markets
0% 20% 40% 60% 80% 100%
Brazil
Russia
India
South Africa
UAE
Malaysia
Singapore
Japan
Australia
Belgium
France
Germany
Italy
Spain
Sweden
UK
US
BYOD Adoption by Major emerging and
mature markets
Average adoption
in mature
markets: 44.4%
Average adoption
in emerging
markets: 74.9%
Source: Ovum Survey(N= 3,726 consumers across 17 countries)
Adoption Trends
1
Preference for BYOD among emerging markets is
primarily driven by two key factors
− Lower rate of corporate mobile handset and tablet
provision in these markets, leading those who feel they
need a mobile device to help with their job to use their
own
− Higher comfort level with mixing work and personal life
than seen among employees in more mature markets
Employees in high growth markets show greater desire
to access corporate data to be able to execute their job
better compared to mature markets
2
Employees in both emerging and mature markets are
preferring single device for work and personal activities
− Preference for single device is higher in high growth
markets compared to mature markets
3
IT Departments are acknowledging the BYOD adoption
and are encouraging use of personal devices and
enabling job done
− Although mature markets don’t see the highest level of
BYOD, IT organizations are readying themselves for the
next step in the development of an enterprise mobility
strategy.
4
Source: BYOD: an emerging market trend in more ways than one – Ovum, Q4 2012 BYOD survey
Business benefits in the form of cost savings and improved employee productivity
outweighs the data security challenge posed by BYOD
Source: News Articles
ChallengesDrivers
• Adoption of smartphones, tablets and notebooks
backed by improving network connectivity
• Ability of IT to introduce new network components
that assist in identifying devices running on Mac OS,
iOS and Android, and enforcing network access
privileges
• Cost savings coupled with increasing employee
productivity and satisfaction
• Loss and unauthorized access to data
• Ability to understand the implications of personal
devices, the type of information that can be stored and
what is expected of them to meet pre- and post
authentication requirements
• Ability to meet regulatory requirements
• Tracking and monitoring devices by IT could lead to
privacy issues
In 2013, Symantec conducted a survey of 236 attendees asking how their company is addressing BYOD, including
risks, challenges, polices, usage and management of mobile devices. While most organizations allow employees to use
personal mobile devices for business purposes, they accepted that doing so will likely result in a mobile
security incident. Survey respondents clearly stated that the use of BYOD is worth the risk, but that they need
technology to enforce policies and protect their organizations from mobile security incidents
The Financial Services and Healthcare sectors are the most active adopters
backed by strong BYOD support policies
Sector Adoption
Level
BYOD Adoption: Challenges and Benefits
Financial
Services
High
• Security is critical for implementation of the BYOD market
• Benefits include:
− Greater collaboration between various parties on-the-move
− Keeping a better track of daily process workflows
Healthcare
High
• Complying with regulations such as HIPAA and HITECH in addition to data security
continues to be the concern area
• Sector is one of the largest adopter of BYOD as it helps to:
− Do more clinical work on mobile devices
− Communicate directly with patients' smartphones
Manufacturing
Medium
• Lack of clear BYOD and related security policies is the key roadblock for adoption
• BYOD provides manufacturing sector with:
− Greater operational excellence
− More agile supply-chain system
Retail
Medium
• Though adoption levels are not too high, the trend is picking up gradually due to the
perceived benefits of BYOD including:
− Better customer service
− Decline in procurement and hardware costs
Public Sector
Medium
• Concerns over security and privacy prevails, however adoption continues to gain traction.
• BYOD adoption helps in:
− Cost-savings on account of lesser documentation
− Increase in productivity (better reporting, and process monitoring)
Source: BYOD adoption across Verticals – HP Blog
Top five leading practices in implementing a BYOD policy
Source: News Articles, Citrix White Paper on Best Practices to BYOD simple and secure
Eligibility
Criteria
• Before implementation of the BYOD policy, its important that organization must make it clear who in the
system is allowed to use personal devices, whether on an ad hoc basis to supplement a corporate endpoint,
as a permanent replacement for a corporate device or anything in between
• Policies need to be more than IT rules – it should take also take into account issues associated with HR
(employee terminations), Legal (compliance), and Security (sensitive information personal and corporate)
Types of
Devices
Allowed
• Organization needs to ensure what device platforms and OS versions it wants to support and accordingly
needs to make sure the mobile devices it is allowing are equipped with the required features.
• It should also consider the types of services it wants to offer on the device and whether it will differ for
specific work groups, user types, device types and network utilized
Password
Protected
• Organization needs to ensure that all the devices are password protected and accordingly decide how
complex the passwords should be and at what duration should it force the user to change the password
• The password policy should clearly define the required password length, complexity, required frequency of
change, failed attempts consequences, and penalties for not following these regulations.
Security and
Compliance
• Organization needs to implement policies to disable printing or access to client-side storage such as local
drives and USB storage
• Users should ensure that antivirus/anti-malware software is appropriately installed and updated on their
endpoint
• Users need to be aware that they are required to notify IT when their device is lost so the device passwords
can be remotely reset or wiped.
Device Support
and
Maintenance
• Organization’s BYOD policy should spell out explicitly how various support and maintenance tasks will be
addressed and paid for
• When a personally-owned device replaces a corporate endpoint, there may be a higher expectation of IT
support, however it should be defined narrowly to avoid exposing IT to greatly increased complexity and
workload
THANK YOU

More Related Content

What's hot

Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
Indian Smartphone market - Analysis and Interpretation
Indian Smartphone market - Analysis and InterpretationIndian Smartphone market - Analysis and Interpretation
Indian Smartphone market - Analysis and InterpretationKaran Verma
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceAkash Gupta
 
Smartphone market in india 2017 - Sample
Smartphone market in india 2017 - SampleSmartphone market in india 2017 - Sample
Smartphone market in india 2017 - SampleNetscribes, Inc.
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey ResultsTony Fish
 
Mobile phone penetration in india
Mobile phone penetration in indiaMobile phone penetration in india
Mobile phone penetration in indiaSarath Allapra
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyGoutama Bachtiar
 
Frost & Sullivan India Mobile Handset & Smartphone Market
Frost & Sullivan India Mobile Handset & Smartphone Market  Frost & Sullivan India Mobile Handset & Smartphone Market
Frost & Sullivan India Mobile Handset & Smartphone Market CarolineLew
 
Smartphone usage in india
Smartphone usage in indiaSmartphone usage in india
Smartphone usage in indiaMukund Mohan
 
Week 6 power point slide -1-case study 1- what does it take to go mobile -ca...
Week 6  power point slide -1-case study 1- what does it take to go mobile -ca...Week 6  power point slide -1-case study 1- what does it take to go mobile -ca...
Week 6 power point slide -1-case study 1- what does it take to go mobile -ca...Zulkifflee Sofee
 
Mobile Industry Overview & Trends
Mobile Industry Overview & TrendsMobile Industry Overview & Trends
Mobile Industry Overview & Trendswomeninnovatemobile
 
Enterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeEnterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeResearchFox
 
Enterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACEnterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACResearchFox
 
Enterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South AmericaEnterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South AmericaResearchFox
 
Enterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaEnterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaResearchFox
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Android Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise PerspectiveAndroid Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise PerspectiveIOSR Journals
 

What's hot (20)

India's Mobile Phone Market
India's Mobile Phone MarketIndia's Mobile Phone Market
India's Mobile Phone Market
 
Smartphones usage in india
Smartphones usage in indiaSmartphones usage in india
Smartphones usage in india
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Indian Smartphone market - Analysis and Interpretation
Indian Smartphone market - Analysis and InterpretationIndian Smartphone market - Analysis and Interpretation
Indian Smartphone market - Analysis and Interpretation
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerce
 
Smartphone market in india 2017 - Sample
Smartphone market in india 2017 - SampleSmartphone market in india 2017 - Sample
Smartphone market in india 2017 - Sample
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
Mobile phone penetration in india
Mobile phone penetration in indiaMobile phone penetration in india
Mobile phone penetration in india
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New Economy
 
Frost & Sullivan India Mobile Handset & Smartphone Market
Frost & Sullivan India Mobile Handset & Smartphone Market  Frost & Sullivan India Mobile Handset & Smartphone Market
Frost & Sullivan India Mobile Handset & Smartphone Market
 
Smartphone usage in india
Smartphone usage in indiaSmartphone usage in india
Smartphone usage in india
 
Week 6 power point slide -1-case study 1- what does it take to go mobile -ca...
Week 6  power point slide -1-case study 1- what does it take to go mobile -ca...Week 6  power point slide -1-case study 1- what does it take to go mobile -ca...
Week 6 power point slide -1-case study 1- what does it take to go mobile -ca...
 
Mobile Industry Overview & Trends
Mobile Industry Overview & TrendsMobile Industry Overview & Trends
Mobile Industry Overview & Trends
 
Enterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeEnterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for Europe
 
Enterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACEnterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APAC
 
Enterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South AmericaEnterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South America
 
Enterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaEnterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North America
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Android Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise PerspectiveAndroid Management Redefined: An Enterprise Perspective
Android Management Redefined: An Enterprise Perspective
 

Similar to Byod market - A Quick Snapshot

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail StoreConsumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store- Mark - Fullbright
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Top 10 Trends in Insurance 2016
Top 10 Trends in Insurance 2016Top 10 Trends in Insurance 2016
Top 10 Trends in Insurance 2016Luis Asenjo Perez
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 

Similar to Byod market - A Quick Snapshot (20)

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
BYOD
BYODBYOD
BYOD
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail StoreConsumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
Consumer vs. Enterprise: Selecting the Right Mobile Device for Your Retail Store
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Top 10 Trends in Insurance 2016
Top 10 Trends in Insurance 2016Top 10 Trends in Insurance 2016
Top 10 Trends in Insurance 2016
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Byod market - A Quick Snapshot

  • 1. BYOD Market Prepared by Linson Kolanchery
  • 2. Significance of BYOD is expected to increase further in the coming years on account of increased awareness of its positive impact on organizational productivity Source: News Articles Note: Figures between 2013 and 2014 are estimated based on MarketsandMarkets projection of growth rate of 26% during the period 0 50 100 150 200 250 300 2013 2014 2015 2016 2017 2018 2019 InUSDBn BYOD Market Growth CAGR: 26% Market Trends • Growing proliferation of smartphones and tablets, coupled with the preference to use a single device, is expected to fuel growth − Smartphones were the most widely used BYOD devices accounting for the largest market share in 2013. − Although notebooks are also used to a large extent, they are expected to exhibit slower growth, compared with tablets • Reduced hardware/device costs along with the use of cloud-based solutions are expected to favorably impact BYOD implementation. − The financial/insurance and health care markets have been among the active adopters. • North America leads the market accounting for 34.7% of the global market share in 2013; expected to remain the largest regional segment over the next six years. • Adoption in emerging markets is expected to remain high primarily attributed to relatively lower provision rates of corporate mobile devices in these regions, coupled with the high degree of comfort and flexibility of individuals in working during traditional downtime. − BYOD demand in the Asia-Pacific region is expected to grow at the fastest rate of 20.6% from 2014 to 2020. “About half of the world’s companies will enact BYOD (bring your own device) programs by 2017 and will no longer provide computing devices to employees. Only 15% of companies will never move to a BYOD model, while 40% will offer a choice between BYOD and employer-provided devices.” - Gartner analyst David Willis Source: MarketsandMarkets*
  • 3. Adoption levels of BYOD seems to be more prevalent in the high growth emerging markets than in mature markets 0% 20% 40% 60% 80% 100% Brazil Russia India South Africa UAE Malaysia Singapore Japan Australia Belgium France Germany Italy Spain Sweden UK US BYOD Adoption by Major emerging and mature markets Average adoption in mature markets: 44.4% Average adoption in emerging markets: 74.9% Source: Ovum Survey(N= 3,726 consumers across 17 countries) Adoption Trends 1 Preference for BYOD among emerging markets is primarily driven by two key factors − Lower rate of corporate mobile handset and tablet provision in these markets, leading those who feel they need a mobile device to help with their job to use their own − Higher comfort level with mixing work and personal life than seen among employees in more mature markets Employees in high growth markets show greater desire to access corporate data to be able to execute their job better compared to mature markets 2 Employees in both emerging and mature markets are preferring single device for work and personal activities − Preference for single device is higher in high growth markets compared to mature markets 3 IT Departments are acknowledging the BYOD adoption and are encouraging use of personal devices and enabling job done − Although mature markets don’t see the highest level of BYOD, IT organizations are readying themselves for the next step in the development of an enterprise mobility strategy. 4 Source: BYOD: an emerging market trend in more ways than one – Ovum, Q4 2012 BYOD survey
  • 4. Business benefits in the form of cost savings and improved employee productivity outweighs the data security challenge posed by BYOD Source: News Articles ChallengesDrivers • Adoption of smartphones, tablets and notebooks backed by improving network connectivity • Ability of IT to introduce new network components that assist in identifying devices running on Mac OS, iOS and Android, and enforcing network access privileges • Cost savings coupled with increasing employee productivity and satisfaction • Loss and unauthorized access to data • Ability to understand the implications of personal devices, the type of information that can be stored and what is expected of them to meet pre- and post authentication requirements • Ability to meet regulatory requirements • Tracking and monitoring devices by IT could lead to privacy issues In 2013, Symantec conducted a survey of 236 attendees asking how their company is addressing BYOD, including risks, challenges, polices, usage and management of mobile devices. While most organizations allow employees to use personal mobile devices for business purposes, they accepted that doing so will likely result in a mobile security incident. Survey respondents clearly stated that the use of BYOD is worth the risk, but that they need technology to enforce policies and protect their organizations from mobile security incidents
  • 5. The Financial Services and Healthcare sectors are the most active adopters backed by strong BYOD support policies Sector Adoption Level BYOD Adoption: Challenges and Benefits Financial Services High • Security is critical for implementation of the BYOD market • Benefits include: − Greater collaboration between various parties on-the-move − Keeping a better track of daily process workflows Healthcare High • Complying with regulations such as HIPAA and HITECH in addition to data security continues to be the concern area • Sector is one of the largest adopter of BYOD as it helps to: − Do more clinical work on mobile devices − Communicate directly with patients' smartphones Manufacturing Medium • Lack of clear BYOD and related security policies is the key roadblock for adoption • BYOD provides manufacturing sector with: − Greater operational excellence − More agile supply-chain system Retail Medium • Though adoption levels are not too high, the trend is picking up gradually due to the perceived benefits of BYOD including: − Better customer service − Decline in procurement and hardware costs Public Sector Medium • Concerns over security and privacy prevails, however adoption continues to gain traction. • BYOD adoption helps in: − Cost-savings on account of lesser documentation − Increase in productivity (better reporting, and process monitoring) Source: BYOD adoption across Verticals – HP Blog
  • 6. Top five leading practices in implementing a BYOD policy Source: News Articles, Citrix White Paper on Best Practices to BYOD simple and secure Eligibility Criteria • Before implementation of the BYOD policy, its important that organization must make it clear who in the system is allowed to use personal devices, whether on an ad hoc basis to supplement a corporate endpoint, as a permanent replacement for a corporate device or anything in between • Policies need to be more than IT rules – it should take also take into account issues associated with HR (employee terminations), Legal (compliance), and Security (sensitive information personal and corporate) Types of Devices Allowed • Organization needs to ensure what device platforms and OS versions it wants to support and accordingly needs to make sure the mobile devices it is allowing are equipped with the required features. • It should also consider the types of services it wants to offer on the device and whether it will differ for specific work groups, user types, device types and network utilized Password Protected • Organization needs to ensure that all the devices are password protected and accordingly decide how complex the passwords should be and at what duration should it force the user to change the password • The password policy should clearly define the required password length, complexity, required frequency of change, failed attempts consequences, and penalties for not following these regulations. Security and Compliance • Organization needs to implement policies to disable printing or access to client-side storage such as local drives and USB storage • Users should ensure that antivirus/anti-malware software is appropriately installed and updated on their endpoint • Users need to be aware that they are required to notify IT when their device is lost so the device passwords can be remotely reset or wiped. Device Support and Maintenance • Organization’s BYOD policy should spell out explicitly how various support and maintenance tasks will be addressed and paid for • When a personally-owned device replaces a corporate endpoint, there may be a higher expectation of IT support, however it should be defined narrowly to avoid exposing IT to greatly increased complexity and workload