IT organizations are having to confront BYOD as an emerging practice and adopt policies and procedures to deal with the security, legal, and support issues that come with enabling employees to use their personal smartphones, tablets, and laptops at work. In this study, we first take a look at adoption trends for BYOD policies by organization size and sector. We also discuss the elements that every BYOD policy should contain, critical steps required to keep the organization protected for enabling BYOD and some of the solutions available for managing and securing mobile devices. To date, our research shows adoption of the practice is immature, but interest is high and adoption is rising. (16 pp., 6 figs)
[Research Byte]
Bring-Your-Own-Device Adoption and Best Practices
$195.00
DISCLAIMER:
Avasant's research and other publications are based on information from the best available sources and Avasant's independent assessment and analysis at the time of publication. Avasant takes no responsibility and assumes no liability for any error/omission or the accuracy of information contained in its research publications. Avasant does not endorse any provider, product or service described in its RadarView™ publications or any other research publications that it makes available to its users, and does not advise users to select only those providers recognized in these publications. Avasant disclaims all warranties, expressed or implied, including any warranties of merchantability or fitness for a particular purpose. None of the graphics, descriptions, research, excerpts, samples or any other content provided in the report(s) or any of its research publications may be reprinted, reproduced, redistributed or used for any external commercial purpose without prior permission from Avasant, LLC. All rights are reserved by Avasant, LLC.