View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
December 10, 2012

Guest Blog: The move from BYOD to CYOD

Tim Patrick-Smith, CIO Getronics UK, writes for CBR on how many organisations are choosing to adopt the more cautious approach of “Choose your own device” rather than leap into BYOD strategies.

By Cbr Rolling Blog



We’re starting to see many organisations choosing not to leap directly to Bring Your Own Device strategies and instead choosing the more cautious approach of Choose Your Own Device, where users select their chosen device from a range of approved products that are able to connect to the company’s infrastructure, run the appropriate anti-virus software etc. Because the devices are corporately-owned and controlled by the IT department, it’s not a huge change from traditional ways of IT management. Supporting a wider range of end-point devices will increase IT costs but could increase business efficiency by allowing the organisation to adopt new form factors and mobility options.

BYOD is a little more complex.

Businesses looking at bringing in a BYOD strategy need to consider three main layers in order to make it work:

  • Create the infrastructure. This includes moving core applications to a separated environment which gives employees Secured access to relevant systems. This normally encompasses a central virtual desktop solution, email system and other applications that employees require to perform daily tasks. These systems are isolated from direct connection from the BYOD pool.
  • Access security – decide exactly how people will connect, and develop applications to ensure a secure connection is established. It is paramount to put in place a connection verification system that identifies the connecting device and protects the data accordingly. These systems are automated, so that when employees connect the device, the software detects whether the device is corporate or personal and ensure access matches the trustworthiness of the device.
  • Data rights management – putting the right software in place helps businesses to control corporate and often confidential data that are accessed from personal devices.

Setting up this type of environment involves substantial costs and so may not be suitable for every business. However these costs could be balanced by savings if, for example, your business has high numbers of contracting staff who could be asked to use their own IT equipment. IT costs may also be reduced with BYOD policies requiring employees to take responsibility for their devices.

The benefits of creating an infrastructure that is built for BYOD architectures lie mainly in the ability of the business to introduce new technologies more readily and to provide greater flexibility and choice to the work force, enabling employees to select and use the solutions that best suit them without substantial IT support cost increases.

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

The biggest risk BYOD poses to businesses is, of course, security. If you’re going to have a free flow of devices connecting to your network, you need to ensure your information is protected. We’ll see data rights management software coming much more to the fore as the BYOD/CYOD trend continues.

Implementing software controls is essential when allowing corporate data to be downloaded on to personal devices not directly owned by the organisation. For Mobile Devices software such as Mobile Iron can work in conjunction with identity services solutions to enforce policies on BYOD devices, allowing certificates and policies to be applied once the owner of the device agrees to the corporate data protection policy.

If the device owner refuses to accept the security policy, then their access is curtailed. Once accepted, the security policy allows the organisation to enforce password controls, encryption and enables the IT management team to erase device settings and data in the event of theft.

It’s also important to develop a watertight, legal policy in place that ensures employees using their own devices are aware of their responsibilities and liabilities. For example, the contract should be very clear about the responsibility of the employee to maintain and pay for their device if broken and to ensure that all software is kept up to date, patched and that virus protection is maintained at all times.

Tim Patrick-Smith, CIO Getronics UK

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.