Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

BYOD Shown To Be A Cost Burden On Businesses

Lieberman Software : 07 August, 2012  (Technical Article)
Lieberman Software study shows cost drain to businesses of implementing Bring-Your-Own-Device policies
The results of a study released by Lieberman Software Corporation confirms that BYOD (bring your own device) increases costs to businesses. Respondents were asked if they believed allowing employees to connect their own devices (such as USB drives, mobile phones, portable PCs and home computers) to the corporate network increased costs – with 67% saying that it did increase costs.

When asked what caused the organization the biggest headache, almost half (43%) cited an employee device introducing a virus; more than a quarter (26%) pointed the finger at employees losing a device, with employees stealing data the biggest concern for 22% of respondents.

The survey was carried out by Lieberman Software of nearly 250 IT professionals in London. These IT professionals are at the front lines of protecting organizations - having to balance the desires of the workforce for flexible and convenient working practices, against the organizations’ requirement for reliable yet secure communications.

Philip Lieberman, president and CEO of privileged identity management software vendor Lieberman Software, believes the BYOD wave is being driven by companies, such as Apple, pushing their products as corporate ready or compatible – even if they’re not.  He says, “We’ve been here before. It’s the same classic back door sales process used to promote PCs in the 1980s, where the large IT shops controlled both the glass house and what was on the desktops. Back then users and managers would show how PCs were better, faster and more flexible than the ‘stone age’ solutions offered by IT. Ultimately IT was forced to adopt PCs as their corporate standard. The new twist today is that the interlopers are devices that will always be owned by the consumer, not the company.”

The core of enterprise trust and authentication has been in-house enterprise identity management with the use of fat clients (i.e. Microsoft Windows) and web browsers that provide integrated authentication of corporate credentials. In the case of many government users, this is further strengthened by the use of smartcard standards such as CAC and PIV.

Lieberman explains, “In today's consumer-owned devices, the ability to adopt and sustain enterprise access and revocation controls is non-existent or impaired. In an effort to meet the demand of BYOD, enterprises are being forced to employ soft certificates with diminished security. While end-users might love the convenience, a lost or compromised device can fast become a nightmare for the CIO. Make sure you understand what you’re opening the organization up to when you allow, or even encourage, your workforce to bring their own devices.”
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo