Guest Post: Shamoun Siddiqui, PhD, CISSP
Recent years have witnessed a veritable revolution brought about by the consumerization of Information Technology. At the heart of this consumerization is a trend generally known as “Bring Your Own Device” or BYOD. This refers to the increasing use of employee owned computing devices such as smartphones, tablets and laptops within a corporate environment, to connect to the company’s networks and its information assets.
The motivation behind BYOD is the self-sufficiency and expertise that employees now possess in the use of personal computing devices that are often technologically superior and more functional than the computers that a company’s IT department typically provides. Increased productivity, employee satisfaction and reduced IT expenses are generally listed as the benefits of a BYOD program.
Therefore, in just a few years, BYOD has suddenly exploded on the information technology and information security landscape in a manner heretofore unseen. Most information technology and information security conferences are simply overwhelmed by BYOD conversations and IT vendors are clamoring to develop new technologies or to force fit their existing solutions into this space.