HOME  |  NEWSLETTER  |  FEEDBACK  |  ABOUT US  |  REGISTER   
Please contact:
David Williams
Global Director of Sales, Research
Heavy Reading
858-829-8612
or via email at:
dave.williams@
heavyreading.com
Enabling BYOD Creates Major Opportunity for Mobile Space
Depending on which statistic you believe, today's average worker carries between two and five different devices for work ranging from smartphones to laptops to tablets, and many more. The reasons aren't difficult to understand: People like the immediate gratification of today's technology. They like devices that give them instant Internet access anywhere, anytime. They like to be able to work or socialize remotely. They like downloading apps, games, videos and ringtones to make their technology their own, and they're more comfortable than ever today working across multiple devices and operating systems.

But as people have become more comfortable with technology, they've naturally segued that comfort into a desire to use it in the workplace. After all, most people spend more time working than doing anything else. Nevertheless, the overwhelming majority of today's enterprises continue to operate under the antiquated mindset that issuing corporate-owned and protected BlackBerrys and laptops will somehow satiate worker's desires for technology. The simple fact is that it's not working.

The result is that people at every level of the enterprise are accessing corporate data with their own technology. This bring-your-own-device (BYOD) mentality is happening, regardless of whether enterprises want it to. The question then becomes how not if enterprises go about enabling BYOD for their employees, as well as for their vendors, customers and others that might need access to corporate networks and information.

As employees are allowed to bring their own devices into the enterprise, several scenarios open the door to corporate liability, including data leakage, exposure to malware and wireless backdoors. For instance, employees are likely to copy sensitive corporate data on to their personal devices and enjoy the flexibility to work at their convenience. If the devices then get lost or stolen, enterprises run the risk of their corporate data falling into the wrong hands. A disgruntled employee could maliciously download sensitive corporate information over Wi-Fi onto a personal device and leak it to outsiders.

Organizations need to ensure their BYOD strategy includes provisioning and management of enterprise applications. The use of mobile devices for only email or general app store-sourced business apps without site licenses will need to shift toward consistent enterprise-wide enablement of workforce with relevant business applications. Organizations that realize the importance of this phenomenon and incorporate it to their BYOD strategy will be ahead of the curve in embracing mobility across their enterprise.

Enabling BYOD Creates Major Opportunity for Mobile Space examines the market for enabling BYOD, analyzing the most promising verticals for enabling BYOD and discussing drivers and challenges in the industry. It includes a comparative analysis of solutions available, examines the geographic landscape of the market and details trends that will likely occur in the industry over the next 18-24 months.
Sample research data from the report is shown in the excerpts below:
Table of Contents (mni0812_toc.pdf)
Over the next two years, BYOD will become the norm rather than the exception. Employees will expect the option to choose their own mobile device and will use their device for both personal and work purposes. With a change in expectations, corporations will have to add BYOD to their policies to protect their confidential information, the strongest driver for enabling BYOD, as shown in the following excerpt. An enterprise that understands the wants and needs of its employees will be able to prevent hindered productivity and risky "work-arounds" the second biggest driver for enabling BYOD.
[click on the image above for the full excerpt]
Companies analyzed in this report include: AirTight Networks Inc.; AirWatch LLC; Antenna Software Inc.; Extreme Networks Inc. (Nasdaq: EXTR); Fiberlink Communications Corp.; Fluke Networks, a wholly-owned subsidiary of Danaher Corp. (NYSE: DHR); Kony Solutions Inc.; MobileIron Inc.; Nomadix, a wholly-owned subsidiary of DoCoMo interTouch Pte. Ltd., a wholly-owned subsidiary of NTT DoCoMo Inc. (NYSE: DCM); Sybase, a division of SAP AG (NYSE: SAP); Websense Inc. (Nasdaq: WBSN); Xirrus Inc.; and Zenprise Inc.
Total pages: 24
To view reports you will need Adobe's Acrobat Reader. If you do not have it, it can be obtained for free at the Adobe web site.
PRIVACY POLICY   TERMS OF USE
HOME  |  NEWSLETTER  |  FEEDBACK  |  ABOUT US  |  REGISTER