Bring Your Own Device Trend

. ()

In the recent years, Bring Your Own Device (BYOD), also called bring your own technology (BYOT), has become a trend and common practice in the business and education market. Almost 80% of Dutch companies have a mobile business plan to date, according to Telecompaper. BYOD is a policy that permits employees to use their own mobile devices such as smartphones, personal computers, tablets and laptops to work and access data in their companies.

Smartphones and tablets are commonly used in offices with a BYOD policy.
Photo by Johan Larsson/flickr

Roughly eight in ten companies have one mobile business plan. In companies with over 100 staff, an average 38 percent of employees have mobile business plans. The BYOD trend is apparent at more than 30 percent of Dutch corporations. Employees are either provided with a Sim or reimbursed for the use of their own mobile devices.

88 percent of the largest companies still provide phones to their personnel. On the other hand, 73 percent of companies with 100 staff give one employee with a company mobile phone.

Last year, Cisco organized a Cisco Plus Virtual conference in Amsterdam. Part of the program concentrated on the latest big trend: Bring Your Own Device (BYOD). Cisco and partners discussed the significance of this trend and the cautious planning and preparation it entails within the enterprise.

30 percent of Dutch corporations carry out BYOD.
Photo by Kuba Bożanowski/flickr

Shell announced their plan to move 135,000 employees to BYOD earlier this year, . The company will take on a huge bring your own device (BYOD) scheme, supporting 135,000 devices individually chosen by users.

Dutch companies such as mITE and The Livingstone Group offer mobile work options and BYOD.

As an alternative scheme, BYOD has been implemented in offices so employees can bring their personal devices in the consumerization of IT (CoIT). CoIT is the combination of personal and business use of hi-tech tools and applications.

In addition to the staff’s preference of using their own devices, the Social media business has a huge effect on BYOD. Every now and then, employees can check their network. Both personal and business technology considerably affects corporate IT departments. These departments conventionally provide and manage the technology that employees use to do work.

There are many advantages to the BYOD approach for businesses including reduced capital expenses. Users will have to pay for their voice and data plans and they can take care of their selected up-to-date devices.

Companies will not be required to buy large quantities of computers or tablets that can easily become obsolete and outdated in the near future.

With the BYOD policies, employees are allowed to use their preferred technology with ease as opposed to what the company requires or dictates. They can also upgrade their devices regularly with the latest features, which some companies cannot afford.

Employee-owned hardware and software have some disadvantages and may have a big impact on corporate security models.

BYOD may put in more costs to the business including investment in hardware, software and policy adjustments. The IT department must also support loads of various devices and operating systems.

Personal hardware and software carry security risks to the company if they access corporate data and are linked to the corporate network. Without proper BYOD implementation, users can download and move business information such as emails and reports. Companies cannot fully manage the different types of applications set on the devices, which makes it tricky to impose security.

Making BYOD Safer for Enterprises

A lot of companies apply a BYOD security policy that emphasizes its place and governance policy to assist IT departments in improving control over employee-owned devices and guarantee network security.

BYOD security can be managed through comprehensive security requirements provided by IT for all personal devices that have connections to the company network. IT may require passwords for the devices and ban some applications from being installed on the device. Information on the device can also be encrypted.

Further BYOD security policy schemes may include restricting specific activities on the devices like setting email control by allowing only corporate email accounts. Recurrent IT audits can also be done to make certain that the device is in fulfillment with the corresponding BYOD security policy.