Browse Definitions:
Reference

Fast Guide to BYOx

Contributor(s): Ivy Wigmore

The trend is so big they call it bring your own everything (BYOx): Employees are using their own hardware and software on the job and the combination of personal and business technology is having a significant impact on corporate IT departments. Traditionally, IT issues and controls the technology that within the enterprise but BYOx is making oversight complicated.

Read on to learn more about BYOx, its effects and how the enterprise can manage them. We provide brief definitions of BYO variations, linked to our more extensive entries and followed by resources to learn more about the trends and their impact on the enterprise.


BYOA (bring your own apps) is the trend toward employee use of third-party applications and cloud services in the workplace.  Because the use of external apps and services can lead to management and security issues, many organizations are implementing acceptable use policies (AUP) for third-party software.

Required reading for learning more about BYOA:

BYOA: Challenges and caveats for controlling the flood of personal apps
Senior site editor Anne Stuart shares three cloud professionals' tips on managing the growing list of personal apps that employees bring to work.

BYOA is here: Six steps to making mobile apps enterprise-ready
BYOA is here. Whether your mobility strategy is done or in progress, these six steps to enterprise-ready mobile apps will help.

Prevent BYOA headaches with clear communication and careful monitoring
BYOA management requires clear communication about and careful monitoring of employees' personal apps.

Mobile lifecycle management takes charge of BYOA
Companies are struggling to cope with the myriad apps that employees now bring to work. Mobile lifecycle management may make sense of the mobile madness.


BYOC (bring your own cloud) is a movement whereby employees and departments use their cloud computing service of choice in the workplace.

Required reading for learning more about BYOC:

Developers and users both have cause to celebrate BYOA and BYOC
Jan Stafford explores the benefits and challenges of the 'bring your own applications' (BYOA) and 'bring your own cloud' (BYOC) trends.

BYOC fosters employee innovation and independence
There are many security concerns with the bring your own cloud and other BYOD trends, but what about the benefits? Look at the upside of BYOC in this tip.

Fill tech gaps in bring your own cloud with cloud services
While BYOC, like BYOD, is generally a balance of cost advantages versus security/compliance risks, there are cloud trends that could upset the balance, and BYOC planners need to watch them.


BYOD (bring your own device), the leader of the BYOx pack, is the increasing trend toward employee-owned devices within a business. Smartphones are the most common example but employees also take their own tabletslaptops and USB drives into the workplace.

Required reading for learning more about BYOD:

BYOD poses big security threat to micro businesses
Micro businesses with fewer than 25 employees have the same rate of mobile device adoption as large enterprises, but lack the security resources to protect users, a study has revealed.

Understanding the hard ROI of BYOD
To the untrained observer, the concept of BYOD is simple: bring in consumer devices and save money. However, this is often based on the incorrect assumption that device costs constitute a significant portion of enterprise mobility spend.

Managing BYOD endpoint security
User devices extend the enterprise to new limits, taking data and applications to those same new limits. In the meantime, securing those devices and data becomes a much more difficult proposition, not only because of geography but also because of the multitude of platforms that must be supported. 

What's the point of your BYOD program?
Thinking about a BYOD program? Make sure you know what the business value is, and that you're not just doing it to placate gadget-happy end users.


BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys. 

Required reading for learning more about BYOE:

Why is BYOE important?
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model.

Encryption key management: Should keys still be stored in the cloud?
Expert Joe Granneman explains whether encryption key management in the cloud is still possible after that slew of revelations around the NSA.

Doing it right: Cloud encryption key management best practices
Expert Dave Shackleford takes a look at what cloud encryption key management is like today and what to know about cloud security providers' processes.


BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.

Required reading for learning more about BYOI:

Bring Your Own Identity Is Here! (Mostly)
Repeat after me: The future is not Bring Your Own Device; that is the present. The future is bring your own identity.

Can OAuth 2.0 strengthen authentication? 
Learn what Open Authentication or OAuth 2.0 is, its risks and rewards, and how it differs from bring your own identity.

Cloud single sign-on adds convenience, but does it sacrifice security?
Cloud single sign-on (SSO) gains popularity as companies adopt applications using multiple cloud services. But don't jeopardize security for convenience.


BYON (bring your own network ) is the ability of end users to create or access alternative networks when the available options are not satisfactory for their purposes. 

Required reading for learning more about BYON:

First BYOD, now BYON poses security challenge
Like bring your own device (BYOD) before it, the march of bring your own network (BYON) is happening silently, stealthily and almost completely outside of management control.

Planning for the future of mobility: A BYOD guide for enterprise CIOs
In this CIO Essential Guide, learn how IT leaders are planning for the future of mobility, aligning consumer devices with bring your own technology trends.

Approaching BYO Wi-Fi hotspot trend, packet capture tips
Read about the risks and benefits of the BYO access point trend and get advice for timing packet capture.


BYOSM (bring your own smart machine) is a policy that allows employees to use their own smart machines  -- robots and cognitive computing systems, for example -- in the workplace.  

Required reading for learning about BYOSM:

Understanding the emerging role of smart machines
Smart machines may be in their infancy, but machine intelligence could have a profound impact on IT and business operations in the future.

Smart robots pave way for better human-machine collaboration
Robots will find a place in the enterprise, but can we trust them? Here's how they will impact the role of IT.

The rise of the smart machines: Here comes the robo-workforce
Smart machines are all over the news and eyeballing human jobs.  In case they're listening, let's make one thing clear. Robots are awwwesome!


BYOT (bring your own technology) is a policy that allows employees or students to use their own personal electronic devices and applications at work or school.

Required reading for learning more about BYOT:

BYOT: Where does it fit into future IT trends? 
In a SearchCIO tweet jam recap, participants suggested current trends toward bring your own technology would continue to offer unique opportunities for enterprise IT departments, but also raise new management headaches.

Unraveling BYOD/T
Opinions and views, recommendations and pitfalls, management tools and security concerns, the endless list continues to keep the CIO bewildered, irrespective of whether s/he embraces BYOT or not.

Planning for the future of mobility: A BYOD guide for enterprise CIOs
For this CIO Chatter, SearchCIO polled readers on whether BYOD is a passing trend or the future of IT. It turns out that BYOT management remains a high priority.


BYOW (bring your own wearables) is a trend toward the use of employee-owned wearable computing devices, such as such as fitness and health monitors, smartwatches and smart eyewear, in a business setting. 

Required reading for learning more about BYOW:

The business value of wearable technology
New wearable technology uses are permeating the enterprise. CIOs can boost employee productivity and derive business value from customer interactions.

Wearable computing technology: What about all that data?
If your organization uses wearable computing technology, odds are you produce a whole lot of data. How can CIOs keep that data actionable and secure?

Can wearable tech fit the business agenda?
Over the next few years wearable technology is expected to make an impact in the consumer and enterprise market. CIOs should consider the implications.


BYOx (bring your own everything) is the all-encompassing term that ties all the foregoing trends together -- because, after all, many enterprises are dealing with all of them.  The trend is sometimes just called “BYO” and is sometimes said to stand for “bring your own anything.”

Required reading for learning more about BYOx:

Four tips from a reformed CTO for making the most of BYOx
If CTO Niel Nickolaisen saw a rogue application, he would crush it. If he spied an unauthorized device connecting to his network, he shut down the attempt. That was then. Now he's living the BYOx life.

BYOx complicates infrastructure for IT pros
BYOX, mobility and cloud computing are the emerging technologies judged most disruptive to IT organizations, according to a survey of IT professionals.

Governance structures for the BYOx era
Bring your own anything is suffusing the enterprise, and CIOs are pursuing new governance structures to tame the mobile chaos.

This was last updated in March 2015

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • supercookie

    A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a ...

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close