1. BYOD in the Enterprise - What's next?

    BYOD in the Enterprise - What's next?

    By Tracy Dupree, August 22, 2013

    Bring your own device (BYOD) may be an overused term but it’s not under used or overlooked by most employees, and many businesses. BYOD saw a rise in popularity about the time Apple released its iPhone 3 and the iPad first generation. And who could blame a person for wanting to bring in their new shiny toy to the office and actually use it?

    Fast forward over a handful or more years and we’ve grown beyond the worries of “can I use it for work” to the expectations of “you need to make it secure so I can work from anywhere, anytime, and all the time” Okay, maybe that’s not exactly your view of BYOD but in general we’ve seen debates about the security of BYOD, the productivity that does or doesn’t come from BYOD. However, the reality is…BYOD, it’s not going away.

    Businesses are becoming more savvy and solutions are emerging to help business IT departments have it easier in managing BYOD. (Three cheers!!)  We’re seeing organizations, such as universities, adopt more BYOD capabilities, and not just because the millennials are among us, but because it supports greater sharing and immediate gratification (when it’s working). A recent report from “Markets and Markets” found BYOD initiatives are growing at an annual rate of 15%, and North American organizations are leading the way with 36% of the overall BYOD and Enterprise Mobility market. The report goes on to say that BYOD is growing in popularity because, in the end, it creates a positive work environment. High five!

    BYOD in the Enterprise has become an expected asset and function of the network. For IT departments, it started as enabling a choice of device. Now it’s moved to enabling access to applications and content. Some call this BYOD 2.0 (gasp!). The concept goes deeper into the security of the data not just device management. This point is well noted and understandably is the future of enterprise BYOD policies. Earlier this year Forrester predicted mobile security will move away from pure device management toward an ecosystem of technologies that offer a range of business controls, including app management, mobile identity and access management, mobile virtualization and analytics. It sounds like BYOD 2.0 isn’t too far off.

    What are your thoughts about BYOD 2.0? Are you already thinking about the data, going beyond the device (management)? 


  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Topics Mentioned

  4. Authors