Bring Your Own Device (BYOD) and Mobility have completely transformed the way that IT departments provision devices to employees. The first attempt at providing secure mobility was to control and lock down devices via enterprise mobility solutions like Mobile Device Management (MDM) or Mobile Application Management (MAM). Unfortunately, employees frequently reject these solutions as too oppressive or too invasive into personal privacy. The result is that millions of dollars are spent on MDM/MAM solutions for BYOD programs that never achieve anticipated broad adoption. So will BYOD be relegated to the dustbin or does it simply need a fresh approach?
For this report, Bitglass conducted two surveys on BYOD adoption, challenges, and overall effectiveness. One survey focused on end users—capturing opinions from 2,021 smartphone toting employees. The second survey captured the distinct view of 227 IT security professionals with responsibility for mobility in their organization. The findings showcase a growing disconnect between end users and IT, signaling that 2015 is turning out to be the year of the Rise of the Employees.
BYOD has room to grow substantially, but the path forward requires a look forward to next-generation of mobile security with data-centric approaches that honor personal privacy and eschew agents and configuration on personal devices.
2015 Energy Industry Cybersecurity Report
Strategic Cybersecurity: A Toolkit for Prioritizing, Coordinating, and Transforming Your Cybersecurity Program