You have some good points but I think you are overlooking the most important issue in that critical and important company information is not really in their control on their equipment. To me security of information is more important and must be maintained on equipment with proper safeguards and not too easily obtained by third parties (their competition).
Intriguing statement. This would solve many problems, but can it be done in a secure fashion? A virtual machine that takes over your iP* or Android phone or tablet during working hours but then reverts to your personal device when you clock out? That would be a lot slicker than carrying two of each device, but where is this application available from?
Works like a charm on most smart(-er) BYOD devices, netbooks, notebooks, loptops.
Rob, great points here. BYOC is a big headache for IT when it comes to BYOD, putting pressure on IT in businesses large and small. The need to meet employee demand for productivity and access while ensuring security and compliance is a familiar dilemma. The reactions of CIOs fall into two schools of thought: (1) allow the use of these services and trust employees to exercise caution, or take a hard-stance and block all access to unsanctioned applications. Neither are the right answers. What IT really wants to do is to push their employees to a sanctioned alternative that allows them to be productive while maintaining the security and control driven by their business and compliance demands. 2011 was the year of mobile device management (MDM), and 2012 we???ll see vendors focus on solutions for extending a new level of protection to the actual applications and data on all devices, whether personal or corporate-issued. ??? Anthony Kennada, Symantec
- Keyboard Shortcuts: