Site icon Aragon Research

Take The Right Approach To Developing A BYOD Strategy

Take The Right Approach To Developing A BYOD Strategy

Author: Mike Anderson                        Date: July 8, 2012

Topic: Workplace                             Research Note Number: 2012-22

Issue: What are the best practices for harnessing the power of mobile computing?

Summary: BYOD places significant pressure on enterprises to take action. The right path toward BYOD strategy requires a holistic approach to a wide range of essential elements.

To download the PDF of this research note, click here.

 

Enterprise response to the “bring your own device” (BYOD) phenomenon ranges from full lock-down to completely embracing BYOD. At the same time, mobile support tools are changing and markets are converging. Providers contending in the management of mobile environments are approaching the market from different starting points, and with different perspectives. Managing BYOD demands attention to many factors beyond the device, and enterprises need a holistic approach for effective planning and management. This note reviews the essential elements needed for a comprehensive BYOD strategy (see Note 1).

The lifecycle approach has become a top marketing message from providers in several mobile management segments. Addressing the device lifecycle has become a selling point for mobile device management (MDM) providers. Mobile application management (MAM) providers recognize the need to reach beyond the devices, and address the app lifecycle starting with development. Others from the networking segments aim to address the lifecycle from requesting entry to the enterprise network. BYOD has implications across all of these dimensions, and requires a lifecycle approach that transcends each of these more siloed models.

Enterprises have adopted a wide variety of approaches to handling their mobile devices and the BYOD phenomenon, and most will need to change their strategy and expand their scope as the mobile workplace evolves. Enterprises need to keep out those who are not authorized, ensure that networks, business systems and data are all protected, and at the same time make it easy for authorized users to be productive.

Effective mobile and BYOD management encompasses many domains, including app stores, MDM and MAM. Enterprises should consider each of these as part of a holistic approach to managing enterprise mobility and BYOD.

Note: This is part of Aragon’s archived research. Please visit our Coverage Areas page to view our most recent content.

Copyright © 2012 Aragon Research Inc. and or its affiliates. All rights reserved.

 

Exit mobile version