Feeds

IT chiefs choose Choose-YOD over full fat BYOD for now

BYO: Sounds great but security corkage wipes out saving

Intelligent flash storage arrays

Insight EMEA boss Stuart Fenton says BYOD is failing to set the world alight: but a half-fat version is gaining some traction within enterprises.

Talking at the annual Insight Technology Show 2013, attended by some 2,000 representatives at 1,500 customers, Fenton told The Channel that "Choose YOD" is whipping up some interest.

"We are building a range of tools to help clients do BYOD. At the moment we think BYOD is still confined to smartphone and a little bit of tablet, particularly the iPad," he told us.

"We are not seeing it bleed across to PCs. What we do think is happening in the enterprise is CYOD where enterprises are focused fairly heavily on providing choice," Fenton added.

He said the "security issue" of BYOD was mitigated by opting instead for a small menu of configurations, with an image for each, that are easier for IT directors to lock down and manage.

An Insight poll of 232 IT bosses in Blighty last autumn showed that a whopping 79 per cent were not drafting a plan to let employees buy their own kit for work and home use.

At the time, Insight warned it would be 12 months before tech vendors had tools to make BYOD more of a reality for the channel, and it seems some IT pros at the show were in agreement.

BYOD helps IT directors save money on device procurement, said Paul Measom, systems engineer at the University of Leicester: but the resultant security and staff training may counter this.

He added that it's also "questionable" if BYOD makes people more productive: "I guess it depends on the nature of [the employee] we are supporting".

Clifford Codrington, IT lord at Nottingham Community and Voluntary Services, was more open minded about the perceived benefits of flexible working - but he warned: "Security is the main issue for us".

Bryan Herbert, network manager at Norfolk-based Northgate High School, said the school issued iPads to teachers and had received demand from students to take their devices into the classroom.

"We have not invested enough in the infrastructure to facilitate BYOD," he said, "we are considering widening access - but we need to make sure devices on the network are tied down." ®

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.