Byod - Overview

Submitted by: Submitted by

Views: 137

Words: 1151

Pages: 5

Category: Business and Industry

Date Submitted: 10/01/2013 01:30 PM

Report This Essay

Bring Your Own Device (BYOD) – An Overview

Adnan A. Bukhari

Dakota State University

Author Note

INFA 732 – Emerging Technologies, Fall 2013

Executive Summary

There are number of security, privacy and intellectual property implications associated with Bring Your Own Device (BYOD), a recent Coalfire1 survey, for the second consecutive year, revealed an ongoing lack of security with smartphones and tablets used to access company data. In addition, the complexity of supporting various types of devices running different operating systems on different carriers is another concern with BYOD.

Besides these challenges according to a 2012 survey by Cisco Internet Business Solutions Group (IBSG), 89 percent of IT companies support BYOD in some form because there can be some cost benefits by adopting BYOD strategy properly. In a recent survey conducted by Cisco2 Systems 2415 users across 6 countries revels that an organization could save $1300 per year per mobile user by implementing a strong BYOD policy.

Keywords: Bring Your Own Device; BYOD

Bring Your Own Device (BYOD) – An Overview

Employees specially the Millennials (Gen Y workers in their 20s and early 30s) driving the adoption of personal mobile devices into the business computing environment. Businesses need a flexible way to provide access to enterprise data and applications without sacrificing the enterprise security standards. An open, security-rich environment that supports employees using a variety of consumer technologies for business purposes may result with increased employee satisfaction with productivity, faster response to client needs and rapid return on investment.

Introduction

According to Gartner3,” Bring your own device (BYOD) is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smartphones and tablets, but the strategy may also be...