2015 is the year to enable BYOD and start realising its benefits
March 26, 2015
Its been almost 30 years since the first mobile phone was launched and today just about everyone has one. According to the GSMA real time tracker the number of mobile devices hit 7.22 billion in October 2014. With mobile usage increasing a recent survey from mobileinsurance.com found an average person spends 23 days a year on their mobile phone!
“With the mobile becoming a must have device there is a common culture to upgrade to the latest and greatest as soon as it arrives.”
A great example of this was the iPhone 6 launch back in September 2014. Apple predicted it would sell 67 million units in the first quarter, a considerable improvement from 51 million sold in the first quarter of the iPhone 5! To say Apple blew this target is an understatement, Apple sold nearly 75 million units in its first quarter with 10 million being sold in the first three days!
“With such a change in adoption and innovation, businesses are left on the back foot, trying to keep up with the latest and greatest personal devices of its employees.”
In the past, transition from an old device to a new would be a huge headache for IT departments in any size organization especially when “whole fleets” require upgrading. It would result in long queues outside the IT department doors and exasperated users with little understanding of the security and configuration nightmare of the IT people beyond.
This has lead to shadow IT “doing their own thing” with iPhone’s and similar devices appearing across businesses. The result is IT having little or no control over the end device and the data boundaries becoming more grey by the day. The net result for some is “lock-down” with users forced to carry yesterdays technology alongside their latest and greatest.
“The industry as a whole has come to find itself in a weird yet interesting situation of limbo between security, innovation and user demand. “
As times change our approach to solutions and new tech requires as much innovation as the tech itself. From my experience this relies on a culture shift from within.
Security ownership needs a re-think. Why do IT need to be a sole owner of the security burden?
With the introduction of 2FA (Two Form Factor Authentication) and next generation MDM (Mobile Device Management) end users have a role in controlling the security domain.
Gone are the days where IT need to complete every device migration. The tools and security are now available to allow users to be empowered, drive innovation and select the device that meets their working style and requirements.
Users now have the ability to move data from one device to another securely, whilst providing IT seamless visibility on connected devices in the field.
Looking to the future complex device migrations are swiftly becoming a thing of the past. With biometric adoption on the horizon, technology is gearing up to make life easier for the end user and making the device world even more competitive.
It makes sense to empower users to choose in a world where nearly all posses some sort of mobile device. By giving users control to protect their endpoint and the ability to transition between devices IT departments can save valuable time and business can realize the true benefits of a mobile workforce.
The change isn’t coming, its here! the benefits for business are there, its time to trust our users!
by Andrew Smith | Head of Professional Services | Annodata