Business of IT: Building a case for BYOD
The consumerisation of IT is upon us and business and technology decision makers must now decide whether they are for or against BYOD. Stephen Pritchard considers the options.

And as well as protecting data, companies also need to pay attention to how personal devices are managed.
Colt, for example, does not install any company software or drivers on employees' personal machines, relying instead on its virtual desktop environment. But in other cases companies might need to ask for the right to wipe a lost phone, or put in place other restrictions on its use.
"Personal devices open up a couple of new issues for IT organisations," cautions Nicko van Someren, CTO at mobile device management vendor Good Technology. There is a much wider variety of personal devices in the field than you would ever have if it were corporate devices as everyone has different tastes. And you have to have ways of separating out the business data from the personal data. The enterprise needs to have control over that business data, but should not have control over personal information."
The most difficult part of a BYOD programme, though, might not be controlling data but building a business case for the moves. BYOD is usually positioned as a cost-saving measure, but doing it properly with the right security and data protection policies and steps to ensure compatibility is not cheap.
"It is almost always possible to solve the technical challenges, but it is not possible to build a business case for BYOD on its own," says Colt's Hewertson. "We supported it by reducing hardware costs, reducing hardware support, avoiding a hardware refresh cycle and changes in how people work. It has to be part of a bigger picture."
If you're interested in finding out more about the future of enterprise mobile computing and want to get advice, insight and thought leadership on how to maximise BYOD in your organisation, look no further than this webcast.
CLICK TO REGISTER NOW
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
What is polymorphic malware?
Explainer Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses
-
Outgoing Kaseya CEO teases "this is just the beginning" for the company
Opinion We spoke to Fred Voccola who remains a key figurehead at the firm as it enters its next chapter...
-
Rebooting your BYOD strategy
In-depth With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
-
IT Pro Panel: Why BYOD is (sort of) here to stay
IT Pro Panel CIOs explain why they aren’t going all-in on personal devices
-
The IT Pro Podcast: Should companies spy on their employees?
IT Pro Podcast Where’s the line between security and surveillance?
-
What are employers' responsibilities when we use personal tech to work from home?
In-depth With many more months of lockdown ahead of us, and workers reluctant to return to the office full time, it's time to think about roles and responsibilities
-
What is the 'personalisation of IT'?
In-depth With millions of people using personal devices for professional purposes while working from home, consumerisation has entered a new phase
-
WhatsApp delays controversial privacy update for businesses
News Users were asked to share data with WhatsApp’s parent company Facebook in order to continue using the service
-
Lenovo ThinkPad L14 review: It’s not right but it’s okay
Reviews Pleasant enough for simple office tasks
-
The consumerisation of IT continues apace – here’s how your business can benefit
In-depth BYOD may be a fact of business, but there are still more ways organisations can grow by embracing consumer tech