Enabling your mobile workforce means exposure to new security threats. Although, trading productivity gains for diminished network security seems like a big risk, the exposure can be managed, and the productivity gains have been proven. With 64 percent of users and IT managers claiming productivity improves when employees use their own devices, it is inevitable that more companies will implement BYOD strategies.
Intel claims an average increase in productivity of nearly an hour a day. For the company as a whole, that means an annual productivity gain of 1.6 million hours. VMware claimed a $2 million annual savings when they moved all employees to a BYOD personal liability and expense reimbursement plan.
Forrester predicts tablet use for work and home to triple to 905 million units by 2017. BYOD is not going away. According to a recent Mobile Analytics Report released by Citrix, the total number of enterprise mobile devices worldwide increased by 72% last year. By 2020, the number of U.S. mobile workers will increase to 105.4 million, a jump from 96.2 million in 2015. This rapid increase is a technology game-changer and most companies, other than the biggest enterprises, are not ready for the increased security risks mobility brings.
The increasingly mobile workforce is outgrowing legacy mobility management environments, and as BYOD has become commonplace in organizations, IT teams must implement BYOD strategies while improving network security. There are solutions.
Companies in every vertical market are looking for solutions–cloud-based services that provide the secure access of an in-house system, but flexible enough to grow with the company’s mobility needs. One example comes from a mid-size financial services company. After extensive research and testing, they decided on a private cloud hosted work-space that could scale to meet the company’s growing needs. The solution combined hosted versions of Citrix XenDesktop™, XenApp™ and XenMobile™.
Security and performance are always key issues with cloud deployment and of primary concern for this financial institution. Citrix NetScaler™ and XenDesktop™ managed both those issues by providing secure remote access to any application on the network from any device type. XenMobile™ expanded the solution by delivering mobile device management (MDM), mobile application management (MAM) and enterprise-grade productivity apps. These apps are integrated into one comprehensive solution regardless of whether the user is on an office desktop or their own device, and all without compromising security. With this approach, the finance company’s sensitive data was secured in the virtual work-space and new users and their own devices could be quickly added as needed.
Is BYOD right for your company?
There is no doubt that offloading some device, management and data transfer costs to users, will achieve significant cost savings in productivity and eliminate many costs of IT. However, there are challenges to be addressed. The number and variety of devices can quickly overwhelm IT groups. Suddenly, they are faced with a vast number of unapproved applications being accessed from mobile devices and using consumer apps for business purposes. This exposes company assets to external threats and can compromise sensitive data.
These issues can be managed. Some companies implement mobile device management (MDM) solutions along with their BYOD programs. MDM centralizes device management and provides IT the ability to perform remote configurations and updates and deliver applications and data to any mobile endpoint. But the advantages of a BYOD program will be further realized by implementing an enterprise mobility management (EMM) solution. EMM is key to managing personal devices in a corporate environment without impacting user experience, inflating costs or introducing security risks.
XenMobile™ is an EMM solution and combines MDM with mobile application management (MAM) and mobile content and data management. This solution helps companies overcome the challenges of any device ownership program – including BYOD and CYOD/COPE.
Need more information on implementing BYOD at your company? I know the right people. Contact me.