- Grid View
- List View
Bring-Your-Own-Device (BYOD) Adoption and Best Practices
The proliferation of smartphones, mobile applications, and desktop virtualization is spawning a surge in BYOD policies. Many IT organizations have such policies, although there is room for growth with this best practice. In this study, we first look at BYOD adoption trends by organization size and sector. We also discuss the elements that every BYOD policy should contain, critical steps required to keep the organization protected for enabling BYOD, and some of the solutions available for managing and securing mobile devices. To date, our research shows adoption of the practice is immature, but interest is high and adoption is rising. (18 pp. 6 fig.)[Research Byte]
BYOD Policies Poised to Grow Rapidly
More than one-third of IT organizations in the U.S. and Canada now have bring-your-own device policies, which could be just the beginning for the fast-rising IT management practice that enables employees to use their own smartphones, tablets, or PCs to access corporate networks and applications. This Research Byte profiles one of the 24 best practices covered in our IT Management Best Practices study.