Professional Documents
Culture Documents
University of Garden City: Advantages A D Disadvantages of Using Your Private Devices (Phones Laptops) For Work Purposes
University of Garden City: Advantages A D Disadvantages of Using Your Private Devices (Phones Laptops) For Work Purposes
Cost Efficiency: Though the BYOD model may require an initial upfront
investment (to create infrastructure), it is much more cost efficient in the long
run. By adopting a BYOD policy, businesses shift the cost of hardware, voice and
data services, and other services towards the user. In doing this, the business is
able to cut expenditures on a monthly basis. While businesses no longer have to
pay the charges associated with service and hardware (procurement,
maintaining, and upgrading), it becomes the employees responsibility. Though
this may seem harrowing, many employees are happy to foot the bill as they can
use the technology they are most comfortable with. The Good Technology State
of BYOD Report states, 50 percent of companies with BYOD models are
requiring employees to cover all costsand they are happy to do so. In addition
to cut service and hardware costs, the BYOD method diminishes IT support costs
as well. Aside from the BYOD model, there is the Stipend model in which
companies provide an allotted amount of money for users to select and purchase
their own device (which can be used for personal and professional activities).
While security breaches can be extremely harmful, the fear of security breach can
hinder the productivity the model allows for. According to the 2012 Blue Coat
Mobility Study, out of 350 respondents, 83% allow employees access to company
email and 56% allow instant messaging on personal devices; however, only
fractions open other services to mobile devices that are not corporately owned.
Organizations are clearly uncertain about mobile malware and employee
acceptance of the IT organization placing security controls on employees
personally owned devices, but that also means those organizations are not fully
realizing the business productivity potential of mobility. states Timothy Chiu,
director of product marketing at Blue Coat.
Though some devices offer extensive security solutions, others may not. This
leads to greater network vulnerability as security is not evenly distributed
amongst devices connected to the network. In order to combat this, there are
some companies and applications that offer solutions such as mobile app
controls to better ensure tight security measures. One company that does such
is Blue Coat. Blue Coat offers WebFilters, which analyze web pages or URLS and
assign them to one (or more) than 94 pre-defined categories. Also application
policies allow companies to control the way users interact with web and mobile
applications. Additionally, Blue Coat allows companies to take information from
the WebFilter databases (for example App name, app operations, and app
category) to identify apps and operations and create policy for end-users, groups,
or the entire organization.