How an organisation navigates the Bring-Your-Own-Device, (BYOD) opportunity--making the most of it's immense advantages, and taking effective measures to neutralise the challenges--can determine value or loss to business. For instance, while BYOD programs can reduce costs, they typically may not too, as the costs of software, infrastructure, personnel support and related services may increase over time, and of course there's the separation of cost challenge too. Besides, there are well-known security challenges too.
Here are three whitepapers by BYOD subject matter experts who can help you make the most of the BYOD opportunity while beating the challenges. Here's how you can leverage BYOD to harness employee-led innovation, ensure data security in a BYOD scenario and empower a next-generation workspace in your organisation.
1) BYOD: A Global Perspective -Harnessing Employee-Led Innovation.
2) Secure data access in a mobile universe.
3) The Next Generation Workspace will revolve around Mobility and Virtualization.
Once companies start including file sharing, business applications and collaboration tools, the costs to provide mobile services go up dramatically.
Below is the summary of the whitepapers:
Key Global Findings and Conclusions
- BYOD is a global phenomenon: strong evidence of employees everywhere using own devices for work; 89 percent of IT departments enable BYOD in some form
- Top BYOD benefits to companies are increased productivity, employee satisfaction, lower costs; 69 percent of IT leaders are "positive" about BYOD
- Employees want BYOD for choice of device, applications, and ability to combine personal and work lives
- Transformative benefit of BYOD is employee-driven innovation by allowing employees to decide how, when, and with which tools work is done, companies can unlock the next wave of value
- BYOD, however, implies new challenges in security and IT support
- Companies must respond proactively to BYOD with improved mobile policy and cost-reduction strategies; desktop virtualization could help
- U.S. and India are far ahead in desktop virtualization: other IT leaders are aware of it, but implementation is lagging
Secure Data Access in a Mobile Universe
In the late 1990s portable laptops and mobile devices emerged that allowed executives to be productive while away from their offices. Devices like the IBM ThinkPad and RIM BlackBerry ushered in an era of multifunction mobile equipment that proved irresistible for the C-suite. Today, the world’s mobile worker population has expanded far beyond corner offices and is expected to reach 1.3bn people, or nearly 38% of the total workforce, by 2015, according to IDC, a technology research firm. By some estimates, as many as 76% of companies currently support a “bring your own device” (BYOD) policy, suddenly thrusting them into the position of securing access to data on devices they might not own. Most of those firms say they allow employees to use personal devices to make more effective decisions, avoid missed opportunities and work more effectively with their partners and customers—the same reasons driving companies to enable mobile data access on firm owned devices. In June 2012 the Economist Intelligence Unit conducted a global survey, sponsored by Cisco, of 578 senior executives to explore their perspectives on securing data on mobile devices.
The Next-Generation Workspace Will Revolve Around Mobility and Virtualization
Today's corporate workspace environment is changing rapidly. Many enterprises focus on providing employees with a flexible workspace that provides ubiquitous access to corporate resources and services – through any devices and from any location. Factors driving demand for workspace flexibility include the growing number of employees who expect to use their own personally selected – and often personally owned – mobile devices, laptops, and other technologies at work. Additionally, many enterprise are implementing a variety of mobility, virtualization, and security solutions to improve employee productivity and to facilitate collaboration between and among their partners, customers and suppliers across the globe.
Copyright © 2011, Biztech2.com - A Network 18 Venture