Sign in to search Gartner Research
Bring your own device (BYOD) programs are transforming the economics of client computing. We summarize our top-level advice and address every part of the BYOD strategy: from planning, to policy, to project management, to cost estimations. We drive deeper into the business case and the question of whether BYOD saves money, and assess the state of the art in management and security technologies.
Gartner analysts Michael Disabato & David Cearley discuss the BYOD phenomenon and its impact on the enterprise.
13 April 2012
The consumerization of IT has had its greatest impact on mobility. The iPad triggered a monumental shift in the tablet marketplace, which has sparked a consumer-driven revolution. End users continue the push to allow their own devices on the enterprise network. This document outlines how to establish a bring your own device (BYOD) policy and analyzes the issues that may accompany it.
6 June 2012
This Toolkit streamlines the creation of mobile device usage policies and procedures. It provides a template for a user-owned (bring your own device) mobile device policy. Suitable for organizations of all sizes, IT leaders can adapt the policy to their BYOD program needs.
27 April 2012
This research provides CIOs with a set of guidelines and questions that can be used to help form or validate their mobile strategies. The emphasis is on evolving a first-generation strategy to one that is more aligned with current mobile technologies and trends.
12 December 2011
A recent announcement by Suncorp, an Australian financial services firm with approximately 20,000 deployed PCs, that it will provide a BYOC (bring your own computer) program by August 2011 has created a buzz in the regional IT industry. Gartner research believes that BYOC efforts will expand dramatically during the next three to five years (see the Gartner research note "Hype Cycle for the High-Performance Workplace, 2010" below) and certainly extend and expand "device" virtualization and VPN solutions.
25 May 2011
A survey conducted at Gartner's various CIO forums shows that most CIOs are preparing for substantial mobile device diversity and, in some regions, are exploring new management models, such as "bring your own" IT.
18 June 2012
"Bring your own device" is proving popular with businesses in most regions around the globe, with all the attendant device management, data security and cost control issues that brings. This research provides a high-level checklist to use when implementing a BYOD program.
5 October 2011
Given the rapid changes in the mobile device market, every organization needs to have a policy in place for use of mobile devices, and must periodically review and update this policy.
22 January 2012
The consumerization of IT has had its greatest impact on mobility. The push is on for better mobility tools. IT still has the responsibility to protect organizational intellectual property and is struggling with bring your own device (BYOD) programs and mobile data management. In addition, IT has a responsibility to improve employee productivity through technological advances.
10 May 2012
Aside from electronic health records, mobility is one of the most transformational movements in healthcare, and represents the new face of user engagement. In the light of this advancing movement, HDO CIOs need to assess how mobility opportunities and challenges will impact their organizations.
3 May 2012
Growing student and staff demands to use personal devices on campus require a strategy built on four overarching bring-your-own-device concerns.
11 July 2012
Institutions on the leading edge of mobile device management for bring your own device are increasing security investments to ensure the safety of confidential information in a similar way to enterprises. Gartner assesses the threats and provides best practices for higher education CIOs.
11 October 2011
BYOC is attracting interest from organizations that look to reduce IT costs and satisfy user demands for device choice, While "bring your own computer" removes some of IT's desktop management responsibility, IT must make additional management investments to make it work.
3 May 2012
There are a variety of security approaches to securely enable the use of employee-owned or consumer-driven smartphones and tablets. Security programs need to match the use case to the best mixture of these tools.
17 May 2012
Although MDM features have commoditized with little differentiation, the platforms are expanding deeper into enterprise mobile software and document management support. Enterprises should look not just at a vendor's MDM technology but also at how well it can support enterprise mobile needs.
8 August 2012
Mobile device management offerings are expanding from traditional configurations, policy management, IT administration and reporting to deeper security with containerization, mobile application management and enterprise content management.
21 November 2011
There's no single way enterprises can distribute applications to smartphones and tablets that use multiple OSs; an enterprise-based mobile app store approach for pushing applications to employees' devices is one option. Enterprises should assess vendors based on 18- to 24-month product life cycles.
22 December 2011
Network access control policies should be a key component of "bring your own device" strategies. We highlight how NAC can mitigate BYOD risks and provide guidelines for using NAC to support your enterprise's BYOD direction.
8 December 2011
The BYOD phenomenon is driving growth in the NAC market as organizations seek to apply policies specific to personally owned mobile devices. Vendors that can easily identify and enforce policies on non-Windows endpoints are positioned for success.
24 May 2012
Secure Web gateways support a wide range of functions. URL filtering and malware detection are the features most in demand. Mobile support, application control and data loss prevention are the emerging market drivers.
3 August 2012
Bring your own device programs for mobile devices will generate support demand for which the service desk is unprepared. Self-support via peer communities is a good option to address the situation.
29 April 2011
Organizations that allow access to applications and data from user-owned devices need to evaluate the costs and trade-offs involved.
24 May 2012
In their rush to support iPads and media tablets, many organizations have overlooked Microsoft software licensing requirements. Correct licensing can save the organization money and keep it compliant.
30 January 2012
The growing smartphone base combined with huge sales of media tablets is forcing a reassessment of the client platform and IT best practices to support it. Controlling burgeoning costs driven by device heterogeneity and bring-your-own-device models, while maintaining agility, is imperative.