Jeanne Bayerl
Jeanne Bayerl has over 25 years' experience in the Enterprise Communications market in North America and Europe. She is...
Read Full Bio >>

Jeanne Bayerl | September 09, 2011 |


I BYOD, Do You?

I BYOD, Do You? You can’t beat 'em, so join 'em. It's all about safe, secure enablement, allowing employees to incorporate personal devices into their business world and non-employees to interact more effectively with you.

You can’t beat 'em, so join 'em. It's all about safe, secure enablement, allowing employees to incorporate personal devices into their business world and non-employees to interact more effectively with you.

Just what we need, more acronyms.... However, if you're not already thinking about what to do about the BYOD (Bring Your Own Device) trend, I'd be surprised. The advance of tablets, smart-phones, netbooks and e-readers in the consumer world is like an unavoidable tidal wave overwhelming the shores in corporate and institutional America. These devices are coming "inside" and accessing networks whether welcomed or not. In my last post I talked about how the user should be at the center of an effective enterprise communications strategy; this is certainly a user-centric, user-driven trend. This brings huge potential--new ways to interact with customers, partners or visitors, new ways to enable your employees, but also headaches--loss of control and security issues. In the end though, I think this is an inevitable trend in most organizations, one that needs to be embraced as an opportunity rather than fought as a nuisance.

It is undeniable that there are major security and stability issues that need to be addressed with allowing all these devices and apps on your network. Wireless LAN network coverage needs to be engineered to manage peak times and areas for demand so as to permit effective, non-frustrating connectivity. Network capacity needs to be managed so that higher priority traffic is not jeopardized. Network access must be controlled, authenticating not only the user, but also the devices to ensure they are safe from malware. User access to specific areas of the network must also be controlled. The trick is to balance all this while still making it easy and seamless for the user, for example, by providing "express re-authentication" for returning users and devices. As with all technology, user-adoption is key; we all know that bad experiences tend to make people shy away from new things.

Arguably, no other type of organization is facing this trend more directly today than an educational institution. Wolf Creek Public Schools in Alberta, Canada provides a great example of an organization that is embracing this trend with a robust, well thought out strategy. You can read more about Wolf Creek's experience in this news article.

And this trend is not just about providing Internet access. Anything with a data connection, speaker and microphone needs to be viewed as a communications device now. My 10-year old daughter figured out on her own how to make her new iPod Touch into a "free" phone for talking and texting her friends (granted it only works where she has WiFi access, but that's getting easier to find). That’s a powerful capability that should be welcomed and harnessed. Software-based solutions that enable the employee to use their own device, and their preferred media (talk, text, email, chat, video, social networking, etc.) are more likely to be adopted--like an old pair of comfortable shoes. Just like a 10-year old can turn an iPod into a phone, an employee should be able to turn the device of their choice into an Enterprise-class communications device.

Lastly, while there are issues with providing end-user help-desk support for solutions driven outward by the IT department, I believe the BYOD trend is somewhat liberating in that regard. If this is viewed as a user-choice optional enablement initiative, as long as the user and device are well-contained to avoid negative impact, the support can be provided on a best-effort basis. Not to say you just drop the ball and ignore helping, but you can certainly provide guidelines on what is officially supported versus what is simply permissible to try.

So, BYOD--I say you can’t beat 'em, so join 'em. It's all about safe, secure enablement, allowing employees to incorporate personal devices into their business world and allowing non-employees to use them to interact more effectively with you. As always, I welcome your thoughts or counter-arguments.


April 19, 2017

Now more than ever, enterprise contact centers have a unique opportunity to lead the way towards complete, digital transformation. Moving your contact center to the cloud is a starting point, quick

April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

April 20, 2017
Robin Gareiss, president of Nemertes Research, shares insight gleaned from the firm's 12th annual UCC Total Cost of Operations study.
March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.