Aug 20, 2013
Using MAM to Communicate a Clear BYOD Policy
Bring your own device (BYOD) programs have evolved from up-and-coming to established practices. In fact, by 2017, more than half of enterprises will require their employees to bring their own devices to work, according to the results of a global survey by Gartner. But as BYOD becomes the norm, some IT professionals are discovering that support and maintenance for multiple platforms has proven to be more difficult than anticipated. In a recent post on the topic by Jenny Schuchert, content and development director and educator for the International Association of IT Asset Managers, Schuchert notes that while the data plans and other upfront costs such as device acquisition have lowered costs for enterprises, the support needed to manage multifaceted mobile computing programs has increased. “Just as companies had gradually relinquished control to the end-users for their mobile device computing needs, they now recognize a need to reclaim some of that control,” says Schuchert. At Apperian, we agree that IT needs to maintain a solid level of managerial and security control over the enterprise mobile apps and data that employees use. As employees increasingly use their own smartphones, tablets, and other mobile computing devices for work, a growing number of IT organizations are recognizing that a command-and-control mobile device management (MDM) strategy is neither practical nor fair. Because IT and employees need to work in a collegial environment in order to make a BYOD program succeed, we believe that a mobile application management (MAM) is the right choice for supporting the needs of both communities while enabling the enterprise to communicate a clear BYOD policy. Using MAM in tandem with an enterprise app store, organizations can enforce and communicate policies for the use of enterprise apps including download and usage guidelines based on the organization’s mobile security protocols and role-based access. An enterprise app store supported by a MAM platform allows employees to opt-in to corporate BYOD and security policies before obtaining access to enterprise apps and data. This also provides a closed loop for IT to ascertain which employees have opted in to BYOD policies for compliance reporting. When IT and employees are all on the same page with BYOD policies, it's a win-win for the enterprise.