Five Myths of BYOD Management

Thursday, March 1, 2012 | comments

BYOD is a culture evolution in 2012! Not a single analyst firm missed the opportunity to list Bring Your Own Device (BYOD) or the Consumerization of IT as one of their top predictions of 2012. in fact, more than half of businesses in 2011 have entered the world of BYOD already.

The purpose of BYOD is also positive: to increase staff satisfaction, improve productivity,  plus, with potential to optimize MEM (Mobility Expense Management).

From IT management perspective, it’s a great opportunity for IT to change the reputation as controller, and empower employees with the tools they favor and show the support,  the risks are also significant, from security & privacy to complexity and governance, here are the five myths of BYOD:


1. Mobile Device Management (hardware & network)

1) Tame the Mobile Heterogeneity Beast: smart phones, tablet PCs, connected smart devices, embedded sensors, and M2M network, all brands, different OS, the emerging mobile eco-system becomes hyper-complex and continuous expanding, the goal of MDM is to balance customerization with  standardization, find pattern from chaos, and create synergy via orchestrating.

2) Device Ownership: The tricky issues seems that the personal mobile device used for work jointly owned by the company and the employee, at piloting period,  organization believe they need that ownership to enforce the policies,  however, with MDM maturity, business are planning to allow some or complete employee ownership.


2. Mobile Data Management

1) Big Data: Social, location, Mobile data become mainstream of Big Data, which turns to be significant asset for modern business today, companies today are increasingly attempting to exploit the huge productivity potential of mobile data in the enterprise, in order to improve customer experience and perceive the new trend to develop next generation of products or services.

2) “Shadow Data”: Corporate data that the organization cannot control in traditional ways is residing on personal device, which is called shadow data, modern MDM need explore the solutions to enforce governance or potential compliance issues.  

3. Mobile Application Management (MAM)

1) Executive Sponsorship: Executives that have witnessed their own personal productivity gains from business-oriented applications on mobile devices are now promoting the development of company- and function-specific apps for employees. 

2) Mobile Application Lifecycle:
  • Sourcing and Developing
  • Reviewing & Sponsorship
  • Experiment and Scale Up
  • Tracking & Auditing
  • User Feedback Open Loop
  • Updating and Version Control
  • Decommission

3) Shadow Application: Employees are using applications that the enterprise didn't select, and whose functionality and licensing terms may be inappropriate, same as shadow data, these shadow applications will bring risks and compliance issues into organization.

4. Mobile Security, GRC Management

1) The first step: Problem Identification:  to identify and inventory all threats. Many mobile device vulnerabilities originate from mobile applications. Downloadable apps present many security issues—including malware, which launches malicious attacks, and spyware, which can be exploited for malicious purposes, including collecting sensitive information from the infected device.

2) The second step: IT needs a centralized, consolidated , simplifying view of all vulnerabilities—mobile and non-mobile,  then IT can make the best decisions on the priority, and holistic GRC strategy & policy, such as:  what to fix first, what happens when personal mobile devices are lost, broken, faulty and so on. Support may have a role to play in understanding whether proposed application upgrades will operate on devices owned by the employees

 3) The Third Step: Training & Education:  Besides security and privacy, there are also legal and insurance issues related to personal devices used for corporate purposes. Policy enforcement, and proper training & education solution need be provided in order to have smooth mobile deployment. 

5. Mobile Expense Management (MEM)

1) Self-Service leverages the Support Cost: To support mobile heterogeneity, statistically the support costs go up only 1.3% for best-in-class business and about 7% of the rest, since users prefer self-service to calling IT for support.

2) Saving from Long-term Contract: The majority of savings come from managing inventory, correcting bills and signing up for long-term contracts to save money over several years, so the MEM need focus on proactive and constant optimization of devices and services to ensure that employees are on the right plans for the proper charges.

3) The Right Mix of Strategy for Mobile Subsidies: Categorize staff into several groups based on how their mobile enablement benefits the job and the organization, user-tailored solution will form the win-win situation for both business and employees.

The essential of BYOD is to shape the trust & enablement culture, to provide rapid access to decisions / approvals / escalations, reduce barriers to workforce collaboration, increase asset efficiency, reduce customer care costs, and empower & delight employees to achieve high-performance result. 
Share this article :

Post a Comment

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Personal Inspiration - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger