How To Prepare For The Next "D" In BYOD
By David Goldschlag, SVP of Strategy, Pulse Secure
A few years ago BYOD (bring your own device) was just an IT buzzword, and now it’s part of everyday conversation. References to BYOD today revolve around personal smartphones and tablets but the rapid introduction of new consumer technologies, like wearables, are changing the notion of what the “D” in BYOD stands for. BYOD today isn’t as much about the device, but more about securing the data, via apps, on the device. Businesses need to start thinking now about how the rise of wearable technologies and the Internet of Things (IoT) will affect their approach to BYOD.
Today, BYOD is being driven by workers who want to stay connected 24/7, aided by the fact that most people are glued to technology. Smartphones and tablets have made it very easy to be available anytime and anywhere. This constant connectivity is also blurring the boundary between work and life inside and outside of the office. While this is certainly driving employee productivity in, and out, of the office, it’s also raising red flags around mobile security and employee privacy.
Backing up for a second, BYOD took off with consumer adoption of Apple and Android smartphones that were more useful and friendly than their corporate-issued BlackBerry devices. And, making things even more complex, the apps on these devices are no longer just about email, Web browsing, or calendar appointments; they’re being used for collaboration, CRM, ERP, and content development. Because apps are being used on these devices for a variety of purposes, this poses a big challenge for IT departments who need to figure out how to best make use of these apps in a secure environment that connects with the cloud and data center.
Please log in or register below to read the full article.
Get unlimited access to:
Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.