APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • BYOD
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 )
    left
    Efficiency and Performance in the Mobile Workforce

    Mark Crandall, CIO, Consulate Health Care

    What Wearables can do for Capital Market Industry

    Georgette Kiser, CIO, The Carlyle Group

     What Wearables can do for Capital Market Industry

    Georgette Kiser, CIO, The Carlyle Group

    The Cybersecurity Risks of BYOD : Are You Taking the Right Steps to Protect Your Company?

    David Freidenberg, CEO, POMM

    R.I.P BYOD: On To The Next One

    David Lingenfelter, Information Security Officer, MaaS360 by IBM

    The Balancing Act of Bring Your Own Device: Growing Your Enterprise Productivity

    Yogi Sikri, Enterprise Mobility Leader & IOT Evangelist, HP Enterprise

    For Enterprise, the Opportunity to Seize BYOD's True Big Data Potential

    Gregg Ostrowski, VP- Global Enterprise Services, Samsung

    right

    The Evolution of BYOD

    Tom Charles Davis, CTO, LANDESK Software

    Tweet
    content-image

    Tom Charles Davis, CTO, LANDESK Software

    At this point, it’s inevitable that employees will bring personal devices to work–whether your organization has a BYOD policy or not. Users want the ability to use their own phones, tablets and laptops at work, without losing ownership or control, but this should raise some red flags for your company. Concerns with BYOD go beyond basic user-privacy issues; there are serious security and compliance matters that need to be addressed to ensure IT ecosystems are not breached.  

    There’s not a quick fix or one-size-fits-all solution to best tackle BYOD, but because the challenge isn’t going away anytime soon, it’s important to adopt a strategy. 74 percent of companies are either already using, or adopting, BYOD policies. Ultimately, the best solutions will account for, and be driven by, the needs of both employees and IT–serving as a compromise between the two.  

    As organizations evolve to keep up in the Digital Age and appeal to the next generation of employees, we will likely see a shift in the prevalence and acceptance of BYOD policies. To better understand the current state of BYOD and predict where we’re headed, we can explore three common approaches companies are taking to handle BYOD:  

    Ostrich Approach  

    Let’s face it, just because an employee got a new iPhone for his/her birthday doesn’t mean IT received another $30 to buy a product to manage it. As a result, sometimes it’s easier for IT to just pretend the new phone doesn’t exist. But make no mistake–ignorance isn’t always bliss. We all have heard the scary stories about mobile devices being used to breach a network. With such a high risk, it’s understandable IT doesn’t want to pop its head up and become responsible, to some degree, for the device and network security. 

    For other IT members, it’s not a question of wanting to be involved, but whether they have the authority to do so. Mobile devices are embedded in our personal lives, and as a result, employees can be sensitive about IT having access to them. Even when IT wants to enforce a policy and properly manage a device, it’s not easy with unclear ownership. In the past, either the employee or the company would purchase the service, data and device, creating a clear distinction. Now, the employee may own the device but there can be ownership divisions at the application and data layer, which only complicates things for IT.  

    When I first started at LANDESK four years ago, I gave 150 engineers the option to pick a mobile device from a list and I would buy it for them. A year later, when we wanted to introduce an elective mobile device management (MDM) solution, the same

    engineers were hesitant to enroll, even though LANDESK had purchased the devices for them. Why? Because they had personalized the devices with photos, texts and notes from their personal life and they didn’t want IT to have control.  

    For some IT teams, that would be enough to stick their heads back into the sand, despite the fact that these devices are typically connected to the corporate network and have access to corporate email services. 

    Cro Magnon Approach  

    Companies that subscribe to the Cro Magnon approach are typically the most cautious about BYOD. In essence, their goal is to remove the ‘Y’ and the ‘O’ from ‘bring your own device.’ Cro Magnon organizations are often prescriptive with their IT and device management policies; outlining which devices they support and making clear distinctions between corporate and personal assets.  

    In highly regulated environments, however, some organizations go as far as to just say no to BYOD altogether. While this is a well-defined stance, it can alienate users and is difficult to enforce. In some cases, users will go around the regulations and connect unauthorized devices to the network, opening the proverbial Pandora’s Box of security and compliance issues.  

    Typically, the strongest force behind the Cro Magnon approach is security. Often times you’ll see organizations in more regulated industries adopt rigid BYOD policies in an effort to be compliant and adhere to policy. It’s also not uncommon for companies that have previously had security breaches lean towards this policy. 

    In theory, this strategy should make IT easier, but in some cases, it just creates a stop-gap solution; requiring a different set of policies to manage mobile and other user devices and PCs. As a result, IT needs two sets of toolsets and solutions that aren’t linked together in order to get their job done and providing a unified experience to the end user remains elusive.   

    Enlightened IT  

    BYOD has its risks, but ultimately, enabling it is based on a real business need. It provides valuable benefits to both users and organizations. For employees, BYOD enables them to use the devices they want and encourages IT self-sufficiency. By adopting this BYOD strategy, organizations can expect to see productivity gains, cost savings and increased employee satisfaction.  

    Still, for IT, BYOD can be a nightmare. In order to navigate this, standardization is key.  

    Standardization is one of the best strategies IT can employ to ensure it delivers high quality service and protects the company and its assets. Standardization of policies is critical in having a well defined and auditable strategy for how IT is going to support and offer services to these devices is key.  Additionally, taking a “user” approach is essential since the user is the common denominator linking all of the devices for which IT is responsible to secure and deliver services.

    One of the biggest challenges IT faces with BYOD is the issue of unique devices. Because each individual manufacturer wants to differentiate their products, each device requires different tools and applications. For IT, this is a time-consuming and frustrating process. Plus, with all of the devices that enter the marketplace, it’s practically impossible to stay up to date on the latest versions.   

    As a result, in the future, we can expect to see many organizations opt for CYOD, or choose your own device. With CYOD, users have the ability to select a device from a list that the organization can support and manage. In doing so, some organizations have found it easier to outline ownership distinctions and expectations for users and the IT department. Truly enlightened organizations, with the right tools, allow users to choose any device, and select a toolset that supports a wide variety of device types.  

    In order to implement the best strategy, IT shops are going to need a unification of toolsets that allow for the management of the different classes of devices by users. Simple MDM capabilities are not sufficient for enterprises wanting to manage PCs in all of their forms. Perhaps years from now, when sandboxed operating systems are ubiquitous, we may be closer. Meanwhile, IT shops need to search for tools that provide that level of integration and support customers need or stich together the integration themselves.

    Weekly Brief

    loading
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Artificial Intelligence - Myths And Truths

    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, Director, BT Business CIO
    The Future Relies on Augmented AI

    The Future Relies on Augmented AI

    Laurent Fresnel, CIO, The Star Entertainment Group
    Digitalization with the use of digital technologies/Improving business through digital technologies

    Digitalization with the use of digital technologies/Improving business through digital technologies

    Wilbertus Darmadi, CIO, Toyota Astra Motor
    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    Rick Stanbridge, VP & Chief Information Officer, Marco’s Pizza
    Bunnings  Diy Digital Transformation

    Bunnings Diy Digital Transformation

    Leah Balter, Chief Information Officer, Bunnings
    For a Smarter City: Trust the Data, Ignore the Hype

    For a Smarter City: Trust the Data, Ignore the Hype

    Brad Dunkle, Deputy CIO, City of Charlotte
    Smart Community Innovation for the Post Pandemic

    Smart Community Innovation for the Post Pandemic

    Harry Meier, Deputy Cio for Innovation, Department of Innovation and Technology, City of Mesa
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://byod.apacciooutlook.com/ciospeaks/-the-evolution-of-byod-nwid-1717.html