Bring your own apps (BYOA) is the trend toward employee use of third-party cloud application services in the workplace.
BYOA is an outgrowth of the bring your own device (BYOD) trend towards and the increasing consumerization of IT. Like it or not, employees are bringing the cloud apps they use on their personal devices to work. Popular consumer apps that are being used for business include Dropbox, CloudOn and Google Docs. Cited benefits of IT consumerization and the use of consumer applications include greater employee engagement and satisfaction as well as improved productivity.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
As employee-owned technologies encroach upon the corporate network, however, security becomes increasingly problematic. Corporate data stored in a third-party cloud provider's environment is no longer under the control of the employee's IT department. If an employee's laptop with sensitive data is stolen, administrators can remotely wipe the hard drive but no such solution exists to protect the company in the event of a data breach in the cloud environment.
Consumerization is changing how employees work and businesses operate. New authentication technologies and policies are required to meet the unique security challenges that the BYOA movement has brought to the enterprise. Learn how multifactor authentication and a layered defense can help prevent your data from accidently walking out the door. There are several types of multifactor authentication technologies from which to choose and other defense mechanisms such as application sandboxing and mobile application distribution platforms security pros can consider. To learn more about MFA, read our comparison of MFA tools to evaluate products and learn about making the case for MFA.
Continue Reading About bring your own apps (BYOA)
- Jon Oltsik writes about how enterprises should take advantage of the consumerization of authentication