Essential Guide

Planning for the future of mobility: A BYOD guide for enterprise CIOs

A comprehensive collection of articles, videos and more, hand-picked by our editors

BYOT: Where does it fit into future IT trends? Readers sound off

Bring your own technology, or BYOT, management remains a high priority for IT departments, but for how long? Readers weigh in on future IT trends.

In a SearchCIO tweet jam recap, participants suggested current trends toward bring your own technology would continue to offer unique opportunities for enterprise IT departments, but also raise new management headaches. Their predictions shed some light on future IT trends, and we followed up by polling our readers, "Are BYOD policies a major concern for CIOs or a fizzling priority?"

Our poll responses echoed the Twitter feedback, highlighting overwhelming support for bring-your-own-technology (BYOT) policy management. In fact, nearly three-quarters of respondents said they view BYOT policies as a major concern, due to advances in consumerism, new data formats and an increased need for security:

  • "BYOT will continue to be a priority for businesses. Developing and implementing a complete mobile strategy is key to ensuring BYOT success."
  • "BYOD [bring-your-own-device] momentum is gathering. Consumerization demands it, and ever-growing cost concerns ensure most have to take it seriously."
  • "CIOs need to be concerned about BYOD to ensure that they are keeping up with all of the devices being used, the new data formats that need to be managed, and possibly the most important aspect: keeping their data safe."
  • "I feel that the demarcation of not only ownership but responsibility/liability ought to be delineated clearly in BYOD policy. Regarding devices, it's reasonable to have baseline requirements, esp. security measures. For instance, I just heard that Samsung actually has an app/mechanism that allows for a "dual-personality" phone. I think that tech manufacturers are sensing a market opportunity that warrants close observation in the near future. In the face of changing technology, it may be prudent to present a short-term policy in the context of a long-term BYOD vision."

As future IT trends develop, there will be a push for BYOT policy management, according to tweet jammers and recap readers. But where is the push coming from?

  • "Direction is coming from board level -- pretty hard to ignore."
  • "Sure, BYOD policies are a major concern, but the people who keep pushing them are also the ones notorious for not following normal security procedures -- just saying."
BYOD policies

 

Only 18% of respondents to our poll viewed BYOD as a fizzling priority, and about 7% had a completely different take on the question at hand. While BYOT might raise concerns regarding data security and the separation of work and pleasure, some had a more glass-half-full perspective:

  • "It is a major concern, but maybe also an opportunity to start thinking differently about security. We do not allow BOYD unless a user completed a security course relevant to such devices. Then [we] analyze and plan."
  • "Not only should it be a major a concern, all at sundry should appreciate business objectives [that] lean toward compliance. Security and existence of a business should not be sacrificed for convenience and trend."

In the time since we published this poll, the prophecies of tweet jam participants and our readers seem to be on track and coming to fruition. BYOT policy management is more and more frequently included in CIO discussions about future IT trends. What's your biggest BYOT concern? Tell us in the comment section below.

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

Planning for the future of mobility: A BYOD guide for enterprise CIOs
Related Discussions

Emily McLaughlin, Associate Site Editor asks:

What's your biggest BYOT concern?

1  Response So Far

Join the Discussion

4 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close