How to Drive BYOD in Your Organization

Posted 2013-07-23 Email Print this article Print
 
 
 
 
 
 
 
BYOD and mobile app management

BYOD is running ahead of organizational thinking and regulatory policy. So, how can companies ensure they're driving the change rather than trying to catch up?

By Frank Diana

Take a seat in any conference room, office, meeting or event, and you’ll be surrounded by mobile devices—tablets, laptops and smartphones. And, if you look a bit closer, odds are that the users of these mobile devices are checking their work email while updating Facebook and reading the latest news articles.

At its core, this is the essence of the bring-your-own-device trend. It lets users access their personal and professional data from the device they’ve chosen to use and, in most cases, own. The mobile workforce is becoming the new norm, but are IT leaders and their organizations equipped to handle the potholes and traffic jams that could arise as they navigate the tricky BYOD roads? Not quite.

In general, companies have little understanding of BYOD costs or ROI and, for many, the move to a BYOD model is not driven by the bottom line but rather by soft goals such as employee satisfaction and attracting young workers. This creates a unique set of obstacles, because BYOD is running ahead of organizational thinking and, more importantly, regulatory policy.

So, what can companies do to get ahead of the BYOD movement and ensure that they are driving the change rather than trying to catch up? Here are some guidelines:

Set objectives and define goals.

The objectives associated with BYOD programs are varied: cost savings, attracting employees, productivity gains, innovation, work-life balance, employee retention, etc. Therefore, executives need to understand exactly what BYOD will do for their company and identify clear goals and objectives.

This means having an understanding of the metrics that will be used to measure success (attrition rates, productivity gains, cost savings, etc.) and ensuring that the process is being measured and monitored. Be careful of the business-case trap: Many digital initiatives are a cost of doing business today and lack a clear business case at the onset.

Establish governance models.

Establishing executive buy-in is critical for BYOD programs, and it goes hand in hand with the need to create strong policies as a starting point for effective governance. Clear, easy-to-understand and enforceable policies need to be the foundation of the program.

Developing these policies must be a collaborative effort that involves IT, legal, HR, finance and the lines of business. These policies must then be communicated, enforced and reviewed on a regular basis. In addition, dynamic policy enforcement is required to govern the lockdown of data and applications.

The broader governance discussion is connected to an enterprise-level issue that deals with governance in the digital age. BYOD must be part of this broader discussion. For example, some thought leaders advocate creating cross-enterprise governance boards to set the company’s digital direction.

Identify potential security risks.

Security is the most often discussed piece of the BYOD story. Loss of data, confidential information and intellectual property tops the list of concerns, with increased exposure to malware infections following closely behind. BYOD programs must address complex issues associated with network security and employee privacy. Some of the methods used by leading companies to address these issues are:

  • A focus on managing data by controlling the apps that can access that data, versus the employees and their devices (MDM: mobile device management). Mobile application management (MAM) is an emerging solution to a broad set of challenges, as we are likely to shift from bringing our own devices to using our own applications.
  • The creation of two virtual phones running simultaneously on the same physical hardware. One phone is for the employee side, on which the worker may use Facebook, Twitter and other consumer-facing applications. The other virtual phone is for the business side, which is dedicated to enterprise applications and data.
  • Virtualization of the desktop and delivery as a service. Employees then have the ability to access that virtual desktop via different devices—from a physical desktop or laptop to a tablet or smartphone.


12>
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters