Video Screencast Help
Scheduled Maintenance: Symantec Connect is scheduled to be down Saturday, April 19 from 10am to 2pm Pacific Standard Time (GMT: 5pm to 9pm) for server migration and upgrade.
Please accept our apologies in advance for any inconvenience this might cause.

Bring Your Own…

Created: 07 Jun 2012 • Updated: 12 Jun 2012
John_Brigden's picture
+2 2 Votes
Login to vote

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications accessible to their internal and external customers from mobile devices. Indeed, your customers are just as likely to use their iPhone, iPad, or other device for business applications as they do for Angry Birds.

With IT organisations having to balance employee engagement and productivity with keeping people secure, the business of protecting information and people cannot be done through a policy-based ‘tick box’ approach. IT organisations voice a number of specific concerns, topped by device loss, data leakage, and unauthorised access to corporate resources.

As BYOD grows in maturity I expect new questions to arise around information governance: is a business allowed to perform eDiscovery on a privately-owned device? Will the organisation need disclaimers? And with the ever-changing data privacy laws in EMEA, how do we keep these disclaimers current?

While device security and management is certainly an important issue, a complete solution must enable the business applications on the device while also securing the information and the application. It is imperative for organisations to protect and isolate corporate data and applications across both corporate-owned and personally-owned devices. This enables personal devices to be used for everyday business purposes while ensuring that the business apps and data are managed and secure. That’s a trend any organisation can readily embrace.