Technology is enabling organizations around the world to allow employees to work from outside the confinements of an office without any negative effect to productivity. Specifically, the bring your own device (BYOD) trend, that is continuing to increase in popularity by the day, is enabling these individuals to use their device of choice for both personal and corporate use.
Some of the benefits of implementing a BYOD strategy include: reduced costs, less calls to IT help desks, improved security, faster response time, and a much higher level of employee satisfaction. However, introducing employee-owned devices to a corporate network can sometimes bring application content or security risks with them as well as obstacles in managing these devices.
In fact, several analysts, including Gartner (News - Alert) and IDC, predict that by 2014, 90 percent of organizations will support corporate applications on personal devices.
Two main factors that have led to BYOD are consumerization of IT and the introduction of mobile-centric enterprises. The consumerization of information technology essentially means that in previous years, new products initially became popular within the consumer industry rather than the enterprise. Today, with products like Android (News - Alert) phones and the iPad, more companies are using them for business-related practices than consumers are for day-to-day activities.
Recently, at the San Jose Editorial Open House in San Jose, Calif. TMC’s Group Editorial Director Erik Linask (News - Alert) had the chance to speak with Vincent Schiavo, CEO of DeviceLock about how the company is powering the BYOD strategy to catch on like wild fire.
Schiavo commented, “BYOD has been a boom to our business because there is so much emphasis now on protecting organizations from people taking sensitive information out of the building via these mobile devices. These has been a real problem for a long time, not only with smartphones but small devices as well like a USB stick, digital cameras, iPads and iPods. So our company really specializes in setting and enforcing policies for the use of those devices in the workplace.”
He added, “I think there is a stereotype out there to group the malicious hackers as someone on the other side of the world who is trying to gain access to your network or even to steal information from your business for profit. While that is still a threat, enterprises need to protect themselves against trusted insiders. A lot of times people do things not realizing that certain things they do could cause security problems, so our software allows users to set and enforce policies for what people can put on those devices.”
To watch the full video, look below.
Want to learn more about today’s powerful mobile Internet ecosystem? Don't miss the Mobility Tech Conference & Expo, collocated with ITEXPO West 2012 taking place Oct. 2-5 2012, in Austin, TX. Stay in touch with everything happening at Mobility Tech Conference & Expo. Follow us on Twitter.
Edited by Rachel Ramsey