SHARE
Facebook X Pinterest WhatsApp

Are You Ready for BYOI?

2014 Cybersecurity Forecast By now nearly everyone is familiar with bring your own device (BYOD). Some people out there still aren’t sure whether BYOD was nothing more than a buzzword in 2013 or if it really was a popular movement with serious security implications. (My personal thought is that the trendiness of the acronym downplayed […]

Written By
SP
Sue Poremba
Dec 26, 2013
Slide Show

2014 Cybersecurity Forecast

By now nearly everyone is familiar with bring your own device (BYOD). Some people out there still aren’t sure whether BYOD was nothing more than a buzzword in 2013 or if it really was a popular movement with serious security implications. (My personal thought is that the trendiness of the acronym downplayed the very real security concerns that the concept brought upon the enterprise.)

But no matter what you think of it, BYOD is, as Art Coviello, executive chairman of RSA, told me in an email, “so 2013.” According to Coviello, we should get ready for BYOI, bring your own identity. BYOI, Coviello added, is the next step in the trend that began with BYOD:

The next evolution will be the consumerization of ID or identity as employees increasingly push for a simpler, more integrated system of identification for all of the ways they use their devices.  Identity will be less entrusted to third parties and increasingly be something closely held and managed by individuals – as closely as they hold their own devices.

BYOD wasn’t really new in 2012 and 2013—many of us were using our personal desktops and laptops to access work networks for many years—but the trend began to steamroll with the increased popularity of smartphones and tablets. Similarly, BYOI, or BYOID, has been around for a while. I found an article on eWeek that was published in 2011 that talked about the topic. But like BYOD, the advances in technology are bringing BYOI to the forefront.

As Michael Angelo, chief security architect at NetIQ, pointed out to me in an email, BYOI will come into play whenever employees use their own third-party identities to conduct transactions. It will be up to security professionals to monitor this use to evaluate risk potential to the network.

At least one person thinks BYOI will improve security. Doron Cohen wrote on the SafeNet blog:

The ability to use a single credential to access a wide range of services often increases security since a user only has to remember one [strong] password instead of multiple passwords.  In some cases, it also enables the user to turn on two-step authentication for a single trusted provider, leveraging one time passcodes as an extra security measure.

BYOI is an acronym that I think we will all be seeing a lot of in 2014. I’ll be especially interested to see how it influences security.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.