The BYOD trend is a hot topic in IT, but that doesn't mean there's agreement on how to support and secure personal mobile devices.
More on the BYOD trend
Defining and enforcing a successful BYOD policy
BYOD security perception vs. reality
Several debates about bring your own device (BYOD) came to the surface during this month's SearchConsumerization.com #CoITchat tweet chat. More than two dozen IT pros, analysts and others participated, and nearly everyone said the BYOD trend is here to stay. But that's about where the agreement and clarity ended.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Our introductory question, "Does your company support BYOD?" led to a discussion on what "support" means. (Hint: It's not the same as "allow.")
In response to our next question, "Is BYOD a fad or is it here to stay?" another question came up: What exactly does the term "BYOD" refer to?
A2: BYOD is nofad, but is an overused term often used interchangeably with consumerization. People will get fatigued by the term #coitchat— Ben Goodman (@benontech) April 16, 2013
A2. BYOD isn't a fad, but in reality it is an ownership issue, nothing more or less #CoITchat— Brian Katz (@bmkatz) April 16, 2013
Another goal of the #CoITchat is to perform a reality check and find out how the BYOD trend and other consumer technologies affect IT departments. To that end, we asked, "How has BYOD changed your approach to security?" As expected, answers varied widely:
A3: BYOD can improve approach to security by getting IT to think about where data is, where it goes, who should have access. #CoITchat— Stephen Cobb (@zcobb) April 16, 2013
A3. FOr most people it hasn't changed their approach yet, only led to an examination of their approach #CoITchat— Brian Katz (@bmkatz) April 16, 2013
A3. Ourselves and many of our customers are moving to a "Zero Trust" model which assumes no endpint is secure or can be trusted #coitchat— Ben Goodman (@benontech) April 16, 2013
A popular security topic is the use of containers to segregate and protect corporate data and applications, and the chat ended with a discussion of that technology. Some were in favor:
In a BYOD world, devices can be trusted if you use a container.#CoITchat— Amit Bajaj (@_amitsbajaj) April 16, 2013
While others had reservations:
Containers violate the reason why user picked a device - loses the whole user experience. not very popular with users. #CoITchat— Jack Gold (@jckgld) April 16, 2013
Check SearchConsumerization.com in early May for details on next month's #CoITchat.
Dig Deeper on Enterprise mobile security