Professional Provider of Enterprise IT Solutions

Unitiv Blog

Subscribe to Unitiv Blog: eMailAlertsEmail Alerts
Get Unitiv Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Related Topics: Cloud Computing, Infrastructure On Demand, Sarbanes Oxley on Ulitzer, Java in the Cloud

Blog Feed Post

BYOD and BYOA: What You Must Know

describe the imageWhile many businesses have been embracing (either willingly or by force) the Bring Your Own Device (BYOD) movement, fewer have addressed the growing trend of Bring Your Own Application (BYOA). Not only are employees working more and more from their smartphones, personal laptop computers and their tablets, but they are even choosing the applications they want to use in order to meet their business needs, often without any consultation with the IT function of the business at all. The “app” culture of today has users picking and choosing without the normal gateway function of IT.

Are BYOA and BYOD solutions viable?

While the viability of BYOD has been demonstrated over the past couple of years, BYOA is much less proven. There are a number of reasons, however, why BYOA may be financially viable for organizations, such as:

  • Applications can be consumed on a usage basis. A site license doesn’t require you to pay for the half of your users who don’t access a given application.
  • There are fewer training requirements. When users bring their own apps, no additional enterprise-wide training has to take place.
  • Integration as a Service (IaaS) as well as standard cloud APIs. As these factors and capabilities increase, you will be able to access many of them via a software appliance or even out of the box.

With this in mind, it’s worth taking a look at what kinds of capabilities you’re going to need for this new, app-centered world.

BYOA Management

There are five areas in which you’re going to need to be able to manage and secure your cloud apps in a BYOA environment:

  • Discovery. You need to be able to identify what apps are being used on your network, who is using them, what devices are involved, and how much data is being pushed in and out of the cloud.
  • Analysis. Security analysis must be at the heart of any BYOA management program.
  • Provisioning. Moving existing apps and licenses into the BYOA environment, and provisioning resources to do so, should be addressed early on in the process.
  • Control. You need to be able to enforce security and compliance and implement sound application policies.
  • Usage. IT needs to have access to the apps used in the business and to help streamline adoption when a new app is introduced.

BYOA and BYOD are viable, but they must be implemented carefully in order to get the most bang for your buck.

Read the original blog entry...

More Stories By Unitiv Blog

Unitiv, Inc., is a professional provider of enterprise IT solutions. Unitiv delivers its services from its headquarters in Alpharetta, Georgia, USA, and its regional office in Iselin, New Jersey, USA. Unitiv provides a strategic approach to its service delivery, focusing on three core components: People, Products, and Processes. The People to advise and support customers. The Products to design and build solutions. The Processes to govern and manage post-implementation operations.