Enterprises That Offer Only Corporate-Liable Programs Will Soon Be the Exception
As enterprise bring your own device (BYOD) programs continue to become more commonplace, 38 percent of companies expect to stop providing devices to workers by 2016, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs
"BYOD strategies are the most radical change to the economics and the culture of client computing in business in decades," said David Willis, vice president and distinguished analyst at Gartner. "The benefits of BYOD include creating new mobile workforce opportunities, increasing employee satisfaction, and reducing or avoiding costs."
Gartner defines a BYOD strategy as an alternative strategy that allows employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. It typically spans smartphones and tablets, but the strategy may also be used for PCs. It may or may not include a subsidy.
BYOD drives innovation for CIOs and the business by increasing the number of mobile application users in the workforce. Rolling out applications throughout the workforce presents myriad new opportunities beyond traditional mobile email and communications. Applications such as time sheets, punch lists, site check-in/check-out, and employee self-service HR applications are just a few examples. Expanding access and driving innovation will ultimately be the legacy of the BYOD phenomenon.
"However, the business case for BYOD needs to be better evaluated," said Mr. Willis. "Most leaders do not understand the benefits, and only 22 percent believe they have made a strong business case. Like other elements of the Nexus of Forces (cloud, mobile, social and information), mobile initiatives are often exploratory and may not have a clearly defined and quantifiable goal, making IT planners uncomfortable. If you are offering BYOD, take advantage of the opportunity to show the rest of the organization the benefits it will bring to them and to the business."
While BYOD is occurring in companies and governments of all sizes, it is most prevalent in midsize and large organizations ($500 million to $5 billion in revenue, with 2,500 to 5,000 employees). BYOD also permits smaller companies to go mobile without a huge device and service investment. Adoption varies widely across the globe. Companies in the United States are twice as likely to allow BYOD as those in Europe, where BYOD has the lowest adoption of all the regions. In contrast, employees in India, China and Brazil are most likely to be using a personal device, typically a standard mobile phone, at work.
How a well-managed BYOD program subsidizes the use of a personal device is critical, and can dramatically change the economics. Today, roughly half of BYOD programs provide a partial reimbursement, and full reimbursement for all costs will become rare. Gartner believes that coupling the effect of mass market adoption with the steady declines in carrier fees, employers will gradually reduce their subsidies and as the number of workers using mobile devices expands, those who receive no subsidy whatsoever will grow.
"The enterprise should subsidize only the service plan on a smartphone," said Mr. Willis. "What happens if you buy a device for an employee and they leave the job a month later? How are you going to settle up? Better to keep it simple. The employee owns the device, and the company helps to cover usage costs.
BYOD does increase risks and changes expectations for CIOs. Unsurprisingly, security is the top concern for BYOD. The risk of data leakage on mobile platforms is particularly acute. Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.
However, in general, IT is catching up to the phenomenon of BYOD. More than half of organizations rate themselves high in security of corporate data for enterprise-owned mobile devices. This new confidence in the security posture to support BYOD is a reflection of more-mature tools and processes that address myriad needs in the security area.
"We're finally reaching the point where IT officially recognizes what has always been going on: People use their business device for nonwork purposes," said Mr. Willis. "They often use a personal device in business. Once you realize that, you'll understand you need to protect data in another way besides locking down the full device. It is essential that IT specify which platforms will be supported and how; what service levels a user should expect; what the user's own responsibilities and risks are; who qualifies; and that IT provides guidelines for employees purchasing a personal device for use at work, such as minimum requirements for operating systems."
More detailed analysis is available in the report "Bring Your Own Device: The Facts and the Future." The report is available on Gartner's website at http://www.gartner.com/resId=2422315.
Mr. Willis will provide additional analysis during the Gartner webinar, "Bring Your Own Device Program Best Practices (BYOD)” on May 2 at 10 a.m. and 1 p.m. EDT. To register for this complimentary webinar, please visit http://my.gartner.com/portal/server.pt?open=512&objID=202&mode=2&PageID=5553&ref=webinar-rss&resId=2392315&srcId=1-2994690285.
Gartner, Inc. (NYSE: IT) is the world's leading research and advisory company. The company helps business leaders across all major functions in every industry and enterprise size with the objective insights they need to make the right decisions. Gartner's comprehensive suite of services delivers strategic advice and proven best practices to help clients succeed in their mission-critical priorities. Gartner is headquartered in Stamford, Connecticut, U.S.A., and has more than 13,000 associates serving clients in 11,000 enterprises in 100 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.