APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Mobility
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    The Evolution of ITs Information to Innovation

    Cheah Kok Hoong,

    iSentric Limited: Steering Organizations towards Excellence in Enterprise Mobility

    CEO

     Accelerating Business Transformation Enabled by Digital

    Shinya Suda, Senior Vice President, Information Systems, Astellas Pharma Inc.

    5G: The Roadmap to Launch in Asia

    Quah Mei Lee, Industry Principal – ICT Practice APAC, Frost & Sullivan

    Data Altruistically Adding Dimensions to Human Possibilities

    Lars Bjork, CEO, Qlik

    B-to-B E-Business in APAC - Is It the Wrong or Right Time to Start in 2017?

    Charles Nie, Head of E-Business & Supply Chain Optimization, Covestro

    Partner Up and get Fresh with Mobile Users

    Todd Miller, VP Global Marketing Solutions, Cheetah Mobile

    Use of Online and Mobile Technology

    Madhu Gayer, Head of Investment Reporting and Performance, Asia Pacific, BNP Paribas Securities Services

    right

    Risk and Reward: How BYOD Has Evolved

    Todd J. Carey, and SVP Mobility Global,

    Tweet
    content-image

    Todd J. Carey,

    We often hear about how technology is transform­ing our lives as both con­sumers and employees. We’ve experienced perpetual change driven by mobility and social technol­ogy creating the expectation to have instant access to any person, informa­tion or product. As consumers, mobil­ity has transformed the way we interact with one another, how we meet people and how we buy and sell products and services. As employees, Bring Your Own Device (BYOD) programs have been in place for years, but the new computing power of smartphones and tablets have changed the way companies should think about their investments in this catego­ry. Mobile has created both, a significant oppor­tunity and risk, for companies looking to leverage the latest mobile trends and technology through BYOD.

    Consider that less than five years ago when we were still waiting for high speed broad band networks to become a reality (some carrier customers would argue they’re still waiting). We’ve covered a lot of ground in a short amount of time to deliver the kinds of wireless connection speed we enjoy as mobile users. As we have matured with connectivity, device manufacturers have kept pace with phones and tablets that can harness that high speed connection and translate it into fantastic rendered views and a great user experience. Processing power, memory and broadband connection speeds are now common and standard for most smart phone users.

    “If a company is going to be serious about embracing the new opportunities that exist in mobility and BYOD, it must be prepared with a security strategy”

    In BYOD, this is where the opportunity exists for companies. Before these advancements, enterprise mobility used to be clunky devices with slow ugly software. Just good enough was the standard which is why most mobility strategies focused on simple, Business to Employee (B2E) apps that had the strongest business case and rate of return. Examples like field service and sales, asset management and inventory tracking were often the main investments. All of these early use cases were important and were the foundation for mobility today. However, there are far more use cases now

    for mobile around social engagement, productivity and collaboration that are lacking in most corporate app stores.

    By most analyst counts, the new smart phone user base is set to exceed two billion by 2016. Companies have an enabled workforce with powerful mobile technology that they did not pay for. By instituting a more aggressive BYOD program regarding device types and operating systems, they can start investing in more meaningful mobile apps. Thankfully, while the industry was building better devices, software architectures and tools also matured. Mobile app design and development is no longer reserved for a small, niche community of developers. Thanks to Mobile Application Development Platforms (MADP) like Kony, Mobile first and Appcelerator, app dev is the main stream so that we can build any app, on any device, anytime. These tools also solve a critical point of failure for B2E apps: the user experience. MADPs have the ability to deliver the same great consumer experience on any device, regardless of the operating system. This is paramount since consumers and employees have the same expectation for app design and experience for any app, not just something designed for personal or consumer use. The same time and resources need to be applied to building great employee apps. This will give them the freedom to spend more time performing the valuable parts of their job and less time stuck in administration and desk driven software.

    Unfortunately, the evolution of mobility has also opened up new hurdles for corporate adoption in the form of security. As smartphones become the standard, in a BYOD environment it becomes harder to create security policies that don’t constrict the power of these devices. It also needs to protect corporate data while not intruding employee’s personal and sensitive information. First generation tactics with Mobile Device Management (MDM) focused on locking down the entire device in order to protect local and network data. The more modern approach features a secure app strategy with Mobile Application Management (MAM) and containerization, but neither MDM nor MAM were designed to combat the constant changing threat landscape that exists today.

    For most companies managing BYOD, IT security is the highest priority since mobile presents a massive risk. Threats now come in all types, whether they are application, physical, web or network attacks. An advanced set of tools are needed to combat these threats and protect employees. Most BYOD programs carry a more generalist approach to policy meant to maintain order and consistent benchmarking. However, hackers are now infiltrating devices through different channels and specific techniques to avoid most of the historic app level protection tools.

    It was assumed that wrapping apps and containerizing them was a sufficient. Unfortunately, while most mainstream MDM and MAM tools hold the line on protection, they do not secure apps outside the container or user actions like clicking links, using vulnerable apps or joining hostile public Wi-Fi networks.Moreover, hackers are exploiting browsers as a more popular way to penetrate systems and attacking through PDF readers, social posts and links.

    If a company is going to be serious about embracing the new opportunities that exist in mobility and BYOD, it must be prepared with a security strategy. Fortunately, like mobile software development, the mobile security marketplace has also seen accelerated growth. Companies like Zimperium, offering mobile edge security solutions that aggressively combat the new threat types, have become an important addition to traditional MDM and MAM tools.

    Mobility and BYOD have both influenced the corporate environment and thanks to new technology and widespread adoption, more opportunities exist for companies to make their employees more valuable and productive. Securing the edge from devices all the way back to the corporate back office is critical to not only protect employees and data, but most importantly to allow an accelerated path to a true mobile enterprise.

    tag

    enterprise mobility

    inventory

    Weekly Brief

    loading
    25 Most Promising Enterprise Mobility Solution Providers
    ON THE DECK

    Mobility 2016

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Modernizing Lending Through Innovative, Secure and Scalable Technology

    Modernizing Lending Through Innovative, Secure and Scalable Technology

    Steven Meek, Chief Information Officer, Pepper Money
    Advancing the Chemical Industry through Digital Transformation

    Advancing the Chemical Industry through Digital Transformation

    Jan Mandrup Olesen, Global Head of Digital Business, Indorama Ventures
    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://mobility.apacciooutlook.com/cxoinsights/risk-and-reward-how-byod-has-evolved-nwid-252.html