SHARE
Facebook X Pinterest WhatsApp

IT Professionals Are of Two BYOD Minds

BYOD Resistance Remains Stiff Within IT The IT community seems to be equally divided between seeing the whole BYOD phenomenon as a boon to corporate productivity or as a disaster in the making. In fact, a new global survey of 1,485 IT leaders, conducted by Vanson Bourne on behalf of Dell Quest suggests it’s even […]

Written By
MV
Mike Vizard
Feb 11, 2013
Slide Show

BYOD Resistance Remains Stiff Within IT

The IT community seems to be equally divided between seeing the whole BYOD phenomenon as a boon to corporate productivity or as a disaster in the making. In fact, a new global survey of 1,485 IT leaders, conducted by Vanson Bourne on behalf of Dell Quest suggests it’s even possible to hold both opinions.

The survey finds that while most IT people recognize why end users prefer to use their own device, they also realize they don’t have the tools and processes needed to effectively manage BYOD at any real level of scale.

Most IT organizations would prefer to move slowly and deliberately when it comes to BYOD. Unfortunately, in many cases, they have already lost control of the situation, which brings with it all kinds of compliance and security issues that IT organizations will more than likely be unfairly held accountable for.

Worse yet, Roger Bjork, director of enterprise mobility solutions at Dell, notes that BYOD is now leading to a bring-your-own-application (BYOA) phenomenon where IT is being asked to manage applications that may come and go at any time.

The survey makes it pretty clear that IT organizations are attempting to reassert control of BYOD and that their colleagues in Europe are significantly ahead in terms of achieving that goal.

But BYOD can’t be achieved without adding more complexity to IT environment, especially when it comes to shifting from a device-centric approach for systems management to a more user-centric approach that requires new tools and processes. Ultimately, the courts may soon decide that debate simply because regardless of corporate policies, a company is tacitly taking responsibility for all the information on that end user’s device, which would, for example, make them liable for losing an employee’s only photo of a deceased relative.

However the debate turns out, it is certain that management of IT will never be the same, which means the question going forward is no longer about what needs to be done, but rather where to get started.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.