{"id":387,"date":"2012-12-18T16:30:33","date_gmt":"2012-12-18T16:30:33","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=387"},"modified":"2012-12-18T16:30:33","modified_gmt":"2012-12-18T16:30:33","slug":"the-facts-and-future-of-byod","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/the-facts-and-future-of-byod\/","title":{"rendered":"The Facts and Future of BYOD"},"content":{"rendered":"
Vodafone has released an interactive whitepaper detailing their predictions on BYOD in the near future, and how it will impact our lives.\u00a0 As you are all probably aware, \u201cBring Your Own Device\u201d is a highly discussed topic among IT and Enterprise personnel, and is bound to make a large impact on our businesses, whether you work for a SMB or a large company.\u00a0 With arguments on both sides of the BYOD fence only one thing is for certain, change is coming.\u00a0 The whitepaper forecasts some of those changes, take a look<\/a> and read below.<\/p>\n Mobile OS Market<\/b><\/p>\n Although Apple seems to have a popularity spike at the moment, Android has many more devices available with their OS, therefore they have it in the hands of more users globally.\u00a0 However Vodafone predicts that both Android and Apple will lose a share of the mobile OS market in the next four years, and that Windows phone will be picking up a much greater share.\u00a0 Currently the Windows Mobile OS only has about 5% of the market, but by 2016 they see that as high as 19%.\u00a0 This is based off of planned use of mobile endpoints by enterprises in the next four years.\u00a0 Enterprises report a possible 30% increase of use with Windows Mobile phones by 2016.<\/p>\n What\u2019s the Risk?<\/b><\/p>\n The biggest argument over BYOD is security and network control.\u00a0 What are you risking when you allow someone to connect their personal device to a corporate network?\u00a0 The whitepaper states that 54% of workers use their personal iPads for work purposes.\u00a0 Is there any harm in that?\u00a0 Let\u2019s look at the statistics.<\/p>\n 87% of them run Anti-Virus Software<\/p>\n 55% have Data Encryption on the Device<\/p>\n 43% can be Remotely Locked or Erased<\/p>\n <\/p>\n <\/p>\n 55% of them run Anti-Virus Software<\/p>\n 49% have Data Encryption of the Device<\/p>\n 42% can be Remotely Locked of Erased<\/p>\n <\/p>\n <\/p>\n 35% Run Anti-Virus Software<\/p>\n 29% have Data Encryption on Device<\/p>\n 29% can be Remotely Locked or Erased<\/p>\n <\/p>\n This should be a concern because a lapse in security can be costly.\u00a0 A single lost or stolen device can potentially cause up to 180,000 dollars in damages to the company.\u00a0 This is assuming there are important or confidential documents that are on the device that cause multiple compliance issues.\u00a0 Don\u2019t fret though, these numbers may seem frightening, but don\u2019t have to be.\u00a0 IT departments that are prepared for BYOD environments can help prevent catastrophes like these.\u00a0 Many require you to accept remote wipe and lock (and even require a constant password) before you are even able to setup company email on the device.\u00a0 This gives them the ability to prevent information leaks if the phone is lost or stolen, provided the user informs them.\u00a0 There are also security manager programs available to help unify security across all of the devices to help manage and enable mobile technology.\u00a0 Security Managers focus on protecting information, authentication to the network, and setting and maintaining security policies.<\/p>\n BYOD is a hot button issue, and it will be for years to come.\u00a0 It will change how we work, whether we embrace it or fight it.\u00a0 People love their devices, and IT has a job to do; finding the balance is going to be critical.<\/p>\n","protected":false},"excerpt":{"rendered":" Vodafone has released an interactive whitepaper detailing their predictions on […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[508],"tags":[858,442,859,443,392,571,572],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/387"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<\/p>\n
\n
\n
\n