The Evolution of Digital Enablement

By Vince DeLuca, CEO Logicalis US

Digital Enablement refers to the way an organization embraces technology and services to improve the customer experience (CX) and in doing so, often changes the nature of the organization itself. Getting an organization to that point requires strategy, planning and a bit of a journey.

Read more

Taking on the BYOD Influx

In the post PC era, anyone who works in an office expects the freedom to work and collaborate with their own mobile devices. Work is no longer a place but any activity, so workers expect anytime, anywhere access to their workplace using the device and the applications they know and trust. Wherever people go, they expect their workplace to go with them.

Read more

Is a weak BYOD strategy better than none at all?

Mike JohnsonGuest author: Mike Johnson, ‎Director UC Architectures & Solutions

Before hastily implementing a BYOD policy, companies need to assess the full scope of risks that come with using mobile devices for work, says a new report from a leading cybersecurity organization.

According to the Information Security Forum, businesses that push BYOD too quickly often neglect or ignore risk management, which can have disastrous consequences. However, current estimates show that somewhere between 60-80% of organizations don’t have BYOD policies in place today–so what should these organizations do?



The first option is to hold off on BYOD. But is this really an option? Organizations that follow this path would soon realize they are hampering their workforce productivity, so another option would be to simply allow for e-mail delivery through Active-Sync and to require a PIN and email wipe, at the bare minimum. Companies can then take their time to thoroughly assess the risks involved in a more robust BYOD policy, develop a comprehensive policy and make an informed decision about how best to track and possibly restrict company information on personal devices. This approach ensures that when the BYOD strategy is put in place, it most likely has accounted for all major risk factors.

The final alternative is to quickly create a BYOD policy and start tracking devices using more robust features, but still keeping it simple. This line of thinking sees that employees are already using mobile devices for work, so the IT department that currently operates without a BYOD plan needs to get one in place as soon as possible, even if it initially ignores a few security holes.

Perhaps we can have it both ways? Should organizations adopt BYOD quickly and then phase in more robust features/functions and security? Or is this hype, and effective BYOD strategies simply require time to develop?

Hype or Ripe
Is it better to have an incomplete BYOD policy than none at all?

View Results

Loading ... Loading ...

BYOD can add up to 32 hours per employee every month

BYOD use among enterprise employees appears to be growing, according to a recent Gartner survey, but some organizations still have yet to jump on board the mobile computing bandwagon.

Tatsianama /

Tatsianama /

Some telling stats from the survey:

  • If run at its optimal capacity, a BYOD program could add up to 32 work hours per month, per employee. That’s nearly a week’s worth of productivity added every month.
  • The majority of BYOD users (74%) say their employers allow BYOD and actively manage it. However, 7% of respondents said their employers had not acted on BYOD, and 19% said their organizations had not communicated a BYOD strategy to them.
  • 26% of those surveyed said their employers required use of their personal devices for work purposes, and 33% said they were allowed to use their own devices for work, but were not required to do so.
  • Just 15% of respondents said their company allows BYOD and enforces a signed mobile device policy.
  • Among all respondents, nearly half use their personal mobile device for work productivity. 43% use it for social communication, 35% to access enterprise data, and 20% use their mobile device to access back-end systems behind a firewall via VPN.

Past research has found that most IT leaders have a favorable view of BYOD, and see greater reliance on BYOD as an unavoidable part of the future workplace. Learn more about how BYOD can help you maximize productivity in your organization.

How to COPE with BYOD in 2014

Tech experts predict BYOD will take a new turn in 2014, and it might be the answer for companies hesitant to adopt the practice. Company owned, personally enabled (COPE) devices are a hybrid of sorts; COPE takes an approach that incorporates the benefits of BYOD and traditional company-owned devices.

The pros of COPE

With 60% of IT and security specialists displeased with BYOD, COPE might be the middle ground that many companies need. As BYOD gains popularity, some IT departments are becoming increasingly nervous about the security of their data. Some companies are finding that COPE gives employees the same access to reliable devices that they would have with BYOD, but can provide reassurance to employers with security concerns.

As with BYOD, employees have the ability to use one device for both professional and personal purposes (within reason), but COPE allows the employer to regain control. Because the company owns the device, if an employee leaves the company, there is no fear of restricted data on his or her device being compromised.

Shutterstock/Slavoljub Pantelic 1

Shutterstock/Slavoljub Pantelic 1

The cons of COPE

Because COPE devices are company owned, there is an added monetary cost, particularly if the company has been using a BYOD model.

Perhaps the biggest downside of COPE is the resulting blurred lines surrounding employee privacy. Because the devices are granted with the understanding that they can be used personally, companies may end up with access to employees’ personal email, social media accounts, online banking information and more.

Hype or Ripe
Will COPE replace BYOD in 2014?

View Results

Loading ... Loading ...
Page 1 of 1012345...10...Last »