dcsimg

BYOD for the CIO: Maximize Productivity While Maintaining Security

  • BYOD for the CIO: Maximize Productivity While Maintaining Security-

    User-Centric BYOD

    It's hopefully now widely accepted industry wisdom that corporate BYOD schemes should be user-centric, rather than device-centric, and that the CIO and team should start by understanding the end users in their organization.

    By understanding and mapping end users' behaviors, roles and needs, the corporate IT organization can build up profiles of end-user categories – such as the millennials, the techies, the CEO, the rogues, and more – as well as how these needs differ by organizational role. Understanding each of these personas and their different needs helps with BYOD policy development and increases the chances of getting the right balance between end-user and corporate needs.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

BYOD for the CIO: Maximize Productivity While Maintaining Security

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • BYOD for the CIO: Maximize Productivity While Maintaining Security-3

    User-Centric BYOD

    It's hopefully now widely accepted industry wisdom that corporate BYOD schemes should be user-centric, rather than device-centric, and that the CIO and team should start by understanding the end users in their organization.

    By understanding and mapping end users' behaviors, roles and needs, the corporate IT organization can build up profiles of end-user categories – such as the millennials, the techies, the CEO, the rogues, and more – as well as how these needs differ by organizational role. Understanding each of these personas and their different needs helps with BYOD policy development and increases the chances of getting the right balance between end-user and corporate needs.

The lives of today's workers are not always divided into neat and separate office and home compartments. Many work at home, sometimes on weekends, and often for longer hours, making them more productive than when in the traditional, office-based nine-to-five role. Nowhere is the blur between home and office more evident than in the social and mobile space, where employees mix work and play in their Twitter streams and use the same phone and laptop for Facebook, Netflix and accessing the corporate CRM system.

Over the last decade, employees have begun bringing better personal IT equipment into the office than they have at work, and want to use it for both personal and work activities. Carrying two phones is a hassle, and some might prefer a tablet or an Apple MacBook over their corporate laptop. This powerful and irreversible employee productivity trend is called "the consumerization of IT" and savvy companies are responding with new enterprise mobility programs, of which bring-your-own-device (BYOD) schemes may be a part.

Today's CIO has a lot to do to make BYOD work, starting with a well-designed and communicated policy covering employee privacy rights and a company's right to monitor, access, review, and disclose company data. The CIO must balance the convenience of BYOD and the improved employee productivity with the realities of employee privacy, corporate security, and the use of mobile device management (MDM) software. There are BYOD minefields that must be negotiated by working closely with HR, finance, legal, and business units, as well as dealing with a wide range of impatient and tech-savvy employees who will say (or perhaps shout) "Why doesn't IT get it? How hard can it be? I just want to do my work."

In this slideshow, Sarah Lahav, CEO of SysAid Technologies, takes a closer look at BYOD and offers advice to help CIOs maximize workplace productivity while maintaining corporate security.