Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2012

BYOD policy: The costs and potential ROI

BYOD:  It might be the most over used acronym of 2012. Unfortunately it’s not just overused, its just as often misused. BYOD is not the same thing as consumerization of IT but rather a response to the trend – i.e., corporate policy to allow employee-owned devices on the network. The trend of consumerization of IT and the numerous corporate policies that are being implemented to deal with it are having significant impact on enterprise security professionals. This impact is being felt from the data center, across corporate networks, on new mobile devices, new mobile applications, and in mobile-supporting cloud infrastructure. Given the degree to which mobility is driving change in enterprise infrastructure purchases, it's important for security professionals to understand where the dollars are going for a BYOD policy, which pieces have a security component, and the arguments for return on investment. LEVEL SET So how many devices are we talking about? According to the independent mobility analyst Tomi Ahonen, by the end of 2012, ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close