Should IT Support BYO Devices?
May 24, 2011 Leave a comment
Back in the day it was expected that organizations would provide, manage and support laptop or desktop computers for their employees’ use. In today’s world, however, employees are increasingly demanding the ability to bring in and use the tablets and smart phones that have become an integral part of their lives.
The Upside of the BYO Device Trend
If you allow employees to bring non-IT approved devices to work, users get a device that they like and tend to keep with them, thereby making them more accessible (and possibly inspiring them to work more outside of the office). The use of BYO devices also tends to shorten training times, since users are already using these devices in other aspects of their lives.
The Downside of the BYO Device Trend
On the other hand, it’s clear that the use of BYO devices will increase your security risks and support costs, and can also raise privacy issues. After all, in the “good old days,” laptops’ and desktops’ internal storage and memory were controlled, standardized and managed by IT. If an employee left the company, the device – and all of the sensitive information that was stored on it – remained within the company.
It’s Time for a Conceptual Shift
In the original model of endpoint support, the boundary of IT support and security extended into the device. In the new BYO device world, a conceptual shift needs to take place regarding that boundary. I believe that one of the clearest ways to do this is to redefine the boundary as being outside of the device. In this model BYO devices are only permitted to access corporate information through a narrowly defined interface. No company information is permitted to be stored on the device.
Regardless of how you choose to handle the situation, though, this is a big issue and having a well thought out plan for managing BYO devices in your work place is a must. What do you think? I welcome your comments.