Business users now expect to be able to access the business network via their own devices, something that needs to be addressed by enterprises in a variety of ways, according to ZDNet's Michael Krigsman on his Beyond IT Failure blog. This is an area where CIOs need to show their value to the organization, he said, as those who innovate policies, adopt new technologies and fully embrace the user-centric approach to IT can make themselves into a hero if it goes well.

There has been some tension between users and businesses, specifically with IT departments, when it comes to BYOD. The lack of trust both ways has specifically come under fire, as a recent Accenture report found that there are misaligned priorities between CIOs and chief marketing officers. Forty-five percent of CIO said marketing is at the top of their priority list while 64 percent of CMO's believe CIOs are at the bottom of the priority list. Krigsman said this likely means these two sides don't talk enough, something Vala Afshar, CMO of networking manufacturer Enterasys, confirmed by saying there is some definite tension due to how devices are used.

"When your tools at home are better than those at work, it causes frustration," he said, according to Krigsman. "Mobility and collaboration are a lifestyle and you cannot expect employees to be chained to their desk."

The friction BYOD causes should mean more collaboration and eventually innovation at organizations. Krigsman said BYOD challenges CIOs to think beyond in-the-box security, so they should look to step outside the usual bounds and thoughts of security and adopt a more helpful mindset to better serve business users of the devices. Tools like mobile device management may help them better figure out security, rules and controls of BYOD.

Make sure BYOD is agile, secure
Nexogy said organizations should take back the reigns on BYOD by any means necessary by following steps such as:

  • Updating mobile policies for those employees who want to use BYOD and consider remote wiping, separating business and personal data and mandating passcodes
  • Figuring out which apps and tools should be whitelisted and blacklisted within the program
  • Seeing which devices employees will be using and ensuring security will be able to handle these gadgets

There are some great benefits of a BOYD policy, but companies need to be sure they are collaborating, thinking about security and enabling users to be able to work as they need to.