The movement to bring your own device computing known as BYOD has created new challenges and opportunities for information companies everywhere. On the one hand, BYOD means lower cost — and thus a lower barrier to entry — for hardware acquisition. On the other, it creates a number of questions about data security and who is responsible for it.
Smartphones and tablets accounted for roughly half the computing devices sold in 2011. It’s hard to overestimate their impact on information technology security and architecture. The number of people who own own smartphones in 2012 is five times what it was in 2008, and more than ten percent of 2012 web traffic worldwide originates on a mobile device. Mobile computing may be the future of business.
Employers increasingly bow to the new reality. Employees will use their devices during the day no matter what, and will resist any attempt to keep them from doing so in the name of security. They also increasingly do not want to carry two mobile phones. Enter BYOD. Many businesses now allow (or require) employees to have a smartphone and to use it for work. BYOD strategies divert employee ingenuity from circumventing restrictions on the use of outside devices and allow them to turn to more productive endeavors. But BYOD also brings with it its own risks.
Who is responsible for the security of the information on the employee’s smartphone? How is it stored? How can the employer safeguard its integrity? In companies that have implemented a BYOD strategy, IT departments find themselves supporting devices that range from iPhones through tablets and netbooks to developer PCs that need specific IDEs. However, a good connectivity solution and centralized data storage can sometimes provide a solution that simplifies the proliferation of screen resolutions, operating systems and hardware that BYOD can generate.
In many ways the movement to smaller devices, while made possible by the increased power and energy efficiency of today’s mobile offerings, is balanced out by BYOD’s challenges, and problems specific to these devices. While smartphones can connect to the internet from almost anywhere, they are for example limited by their battery life, which can be quite short if the user needs to do a significant amount of computing. When employees were connecting with laptops they were more limited in their ability to get online but once they did the charge on their batteries was rarely a concern.
Contact Evolve Technologies to implement your company’s BYOD solution, 800.923.3525