Submitted by: Submitted by adnanbukhari
Views: 137
Words: 1151
Pages: 5
Category: Business and Industry
Date Submitted: 10/01/2013 01:30 PM
Bring Your Own Device (BYOD) – An Overview
Adnan A. Bukhari
Dakota State University
Author Note
INFA 732 – Emerging Technologies, Fall 2013
Executive Summary
There are number of security, privacy and intellectual property implications associated with Bring Your Own Device (BYOD), a recent Coalfire1 survey, for the second consecutive year, revealed an ongoing lack of security with smartphones and tablets used to access company data. In addition, the complexity of supporting various types of devices running different operating systems on different carriers is another concern with BYOD.
Besides these challenges according to a 2012 survey by Cisco Internet Business Solutions Group (IBSG), 89 percent of IT companies support BYOD in some form because there can be some cost benefits by adopting BYOD strategy properly. In a recent survey conducted by Cisco2 Systems 2415 users across 6 countries revels that an organization could save $1300 per year per mobile user by implementing a strong BYOD policy.
Keywords: Bring Your Own Device; BYOD
Bring Your Own Device (BYOD) – An Overview
Employees specially the Millennials (Gen Y workers in their 20s and early 30s) driving the adoption of personal mobile devices into the business computing environment. Businesses need a flexible way to provide access to enterprise data and applications without sacrificing the enterprise security standards. An open, security-rich environment that supports employees using a variety of consumer technologies for business purposes may result with increased employee satisfaction with productivity, faster response to client needs and rapid return on investment.
Introduction
According to Gartner3,” Bring your own device (BYOD) is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smartphones and tablets, but the strategy may also be...