Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Enterprise mobile management's evolution
Definition

BYOD (bring your own device)

Contributor(s): Ivy Wigmore

BYOD (bring your own device) is the increasing trend toward employee-owned devices within a business. Smartphones are the most common example but employees also take their own tablets, laptops and USB drives into the workplace.

BYOD is part of the larger trend of IT consumerization, in which consumer software and hardware are being brought into the enterprise. BYOT (bring your own technology) refers to the use of consumer devices and applications in the workplace. More specific variations on the term include bring your own computer (BYOC), bring your own laptop (BYOL), bring your own apps (BYOA) and bring your own PC (BYOPC).

Employee-owned devices are sometimes sanctioned by the company and supported alongside devices that are owned by the business. In other cases, employee-owned devices are part of the parallel system known as shadow IT: hardware or software within an enterprise that is not supported by the organization’s central IT department.

Whether employee-owned hardware and software are supported or not, they pose security risks to the organization if they connect to the corporate network or access corporate data. To minimize the risk and accommodate consumer technologies, many businesses are implementing BYOD policies.

This was last updated in October 2012

Next Steps

Considering implementing mobile device management products? Read expert advice about how to use mobile device management products to deal with the challenges of protecting company data on personal mobile devices and find out why it's important to thoroughly review BYOD use in your organization before choosing an MDM vendor.

Continue Reading About BYOD (bring your own device)

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

BYOD is not a threat anymore. Employee could use Remote access VPN ( http://www.purevpn.com/blog/secure-remote-access-vpn/ ) to secure their internet connection and personal data
Cancel
Great explanation. Our employees also use their private mobile devices and we have created the EMM software from apptec360 (www.apptec360.com) and are on the safe side. The BYOD solution will find its place in most companies in the near future.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close