Security "Bits"

Here's Why Your BYOD Program Will Fail

By Rich Campagna | March 12, 2014 at 9:04 AM

shutterstock_178695791According to Gartner, 20% of enterprise BYOD programs will fail because they are too restrictive, and because they give IT access to personal information. The root of this issue is that we have taken concepts and functionality from the world of corporate managed PCs and applied them to personally-owned mobile devices via MDM. MDM offers the IT organization full control over the user's device, including the ability to track the user's location and to inventory and control applications on the mobile device.

The problem is that your employees are getting more and more savvy with respect to what IT can do with MDM and they are starting to push back. Barely a week goes by when I don't encounter a customer that complains of executives and even other IT counterparts that carry two phones or *gasp* forward their work email to a personal email account because they don't want IT to be able to see what they are doing on their personal mobile devices.

Does your program fall into this camp? 

Now that you have a couple of years of BYOD under your belt, it's time to rethink your strategy. Sure, there are mobile device management best practices, such as setting a passcode on mobile devices. Those best practices need to be followed, even for BYOD, but resist the urge to control the device like you would a corporate-owned laptop. Your next attempt at BYOD security must focus on securing corporate data, while allowing your employees the freedom and flexibility that BYOD promises. 

Find out how in our upcoming webinar.

Sign-Me Up!



see all