Bring Your Own Device (BYOD) – An Overview
Adnan A. Bukhari
Dakota State University
INFA 732 – Emerging Technologies, Fall 2013
There are number of security, privacy and intellectual property implications associated with Bring Your Own Device (BYOD), a recent Coalfire1 survey, for the second consecutive year, revealed an ongoing lack of security with smartphones and tablets used to access company data. In addition, the complexity of supporting various types of devices running different operating systems on different carriers is another concern with BYOD.
Besides these challenges according to a 2012 survey by Cisco Internet Business Solutions Group ...view middle of the document...
Typically, it spans smartphones and tablets, but the strategy may also be used for PCs.”
With growing use of smart phones and tablet computers the challenge that many organizations are facing is supporting BYOD without sacrificing the security requirements for corporate data and applications.
BYOD Trend Drivers
According to comScore4, Inc., a leader in measuring the digital world, 143.3 million people in the U.S. owned smartphones (60 percent mobile market penetration) during the three months ending in July, 2013, up 3 percent since April 2013. These numbers suggest that US Smartphone market has already entered in late innings suggesting smartphone alone a big reason for enterprises to adopt a BYOD strategy.
“Smartphone today has more computing power than all of NASA did when it put a man on the moon in 1969” said Intel CEO Paul Otellini5 in his keynote at the 2012 International CES. Growing power of mobile devices and lowering cost making it affordable for corporate employees to carry their own mobile device to workplace. Cloud Computing Technologies are matured enough and large organizations are moving to Cloud at a very fast pace. Gartner predicts5,“Cloud Office Systems Total 8 Percent of the Overall Office Market and Will Rise to 33 Percent by 2017” This growing trend of Cloud Computing and Software as a Service is playing a crucial role in adoption of BYOD. Employees can access their work applications from anywhere if they are deployed on a cloud.
Widespread use of social media and advances in network performance are some other factors contributing to growing adoption of BYOD.
As anyone can see putting corporate data on a personal device comes with some inherent risks as very well identified in a research conducted by Schmidt (2012), “four in 10 organizations surveyed indicate they have a history of BYOD-related breaches in security. Nearly half the respondents believe that BYOD practices may threaten auditing and compliance obligations. Other concerns cited include loss of infrastructure control and data as well as the danger of a company's restricted, proprietary information getting into the wrong hands when an employee's device is lost or stolen.”
Potential benefits of BYOD included but not limited to:
* Reduced hardware costs, an increasing number of employees already own powerful devices and employees might take better care of a device if they contribute their own money towards it
* Employees prefer to use their own device because they are familiar with them and have tailored to their usage preferences to increase their productivity
* Employees prefer to carry only one device
* Most recent surveys shows an improved employee job satisfaction, staff retention and recruitment as result of BYOD
Besides managing the requirements Schmidt (2012)...