Skip to main content
Aug 27, 2014

How to Develop a BYOD Program Employees will Embrace

Developing a successful BYOD program requires the blending of two seemingly disparate requirements. On the one hand, an absolute focus on ensuring that corporate apps, data, access, and other assets are protected. On the other hand, creating a compelling environment and processes that employees can easily adopt and support, both in their adoption of mobility as an enterprise tool and in removing reasons for them to work around any restrictions, conditions, and limitations that may be required to create a secure corporate mobile infrastructure. We offer several recommendations for developing BYOD programs that will be effective and employees will embrace.

Identify a BYOD User Community

A great way to promote the benefits of a BYOD program to employees is by having a community of users who can share the advantages of mobility quickly and easily in terms of productivity benefits and their own roles and ability to access data and apps whenever and wherever they need to. If this community of users includes one or more organizational leaders or opinion-makers, the impact of this initial deployment may be even larger.

Show the benefits

When companies can clearly demonstrate the value of BYOD programs to employee groups (e.g. sales teams, HR, field service), employees are more likely to see the personal value that BYOD programs can deliver to them. This can be achieved through town hall programs, lunch meetings, and other forums where business unit leaders or individual employees can speak to the productivity gains and simplicity of accessing and using enterprise apps that make it easy for people to do their jobs. Some of the most successful programs we have seen include internal marketing efforts focused on very concrete values that mobility delivers to individuals, for example in larger sales commissions, smaller time spent on routine tasks, better communication and outcomes, increased access to data, etc.

Prove that personal data will be protected

By using their personal devices at work, employees have a lot of skin in the game. They want to be reassured that their personal data will remain safe while their mobile devices aren't being controlled by the enterprise. Providing clear, easy to understand, and unambiguous proof of that protection will go a long way in the employees’ acceptance of the program as well as their level of adoption.

Ensure it’s intuitive for users

By allowing employees to use their own smartphones, tablets, and laptops, employees are effectively choosing the tool they each feel is the best fit for their jobs. Employees are already familiar with their own personal devices, and that familiarity can help gain their confidence in moving forward with BYOD in the workplace. This means that the solution chosen must be as invisible as possible to users, must respect and support the user experience that is familiar to them, in the platform that they have chosen. Enterprise mobile users come in many levels of experience and technical savvy. Their adoption of an enterprise mobility strategy, even in full or mixed BYOD environments, depends greatly on having a system in place that responds to that breadth of expertise and experience.

Demo that an enterprise app store is easy to use

Showing employees how easy it is to locate the types of apps that can benefit their jobs in an enterprise app store can help seal the deal with employees on enterprise mobility programs. An app store that is easy and intuitive to use, that guides users through the corporate and public apps that will help them in their day to day work, and that allows them to easily stay current with the tools and content they need is a core element of any successful BYOD program and one that can never be underestimated. This post originally appeared on Wired Innovation Insights on August 19, 2014.

Learn More

Watch "Mobility Security You Need with BYOD Your Employees Love." You can access the recording here.

Apperian

More from the Blog
May 07, 2018

It's Time To Get Serious About Application Security

Apr 02, 2018

How to Detect App Threats to Protect Your Business

Apr 02, 2018

Protecting Apps Is Not Enough: Why You Need Threat Analytics

Every app downloaded via an app store is running in a
Read more