Browse Definitions:
Reference

Fast Guide to BYOx

Contributor(s): Ivy Wigmore

The trend is so big they call it bring your own everything (BYOx): Employees are using their own hardware and software on the job and the combination of personal and business technology is having a significant impact on corporate IT departments. Traditionally, IT issues and controls the technology that within the enterprise but BYOx is making oversight complicated.

Read on to learn more about BYOx, its effects and how the enterprise can manage them. We provide brief definitions of BYO variations, linked to our more extensive entries and followed by resources to learn more about the trends and their impact on the enterprise.


BYOA (bring your own apps) is the trend toward employee use of third-party applications and cloud services in the workplace.  Because the use of external apps and services can lead to management and security issues, many organizations are implementing acceptable use policies (AUP) for third-party software.

Required reading for learning more about BYOA:

BYOA: Challenges and caveats for controlling the flood of personal apps
Senior site editor Anne Stuart shares three cloud professionals' tips on managing the growing list of personal apps that employees bring to work.

BYOA is here: Six steps to making mobile apps enterprise-ready
BYOA is here. Whether your mobility strategy is done or in progress, these six steps to enterprise-ready mobile apps will help.

Prevent BYOA headaches with clear communication and careful monitoring
BYOA management requires clear communication about and careful monitoring of employees' personal apps.

Mobile lifecycle management takes charge of BYOA
Companies are struggling to cope with the myriad apps that employees now bring to work. Mobile lifecycle management may make sense of the mobile madness.


BYOC (bring your own cloud) is a movement whereby employees and departments use their cloud computing service of choice in the workplace.

Required reading for learning more about BYOC:

Developers and users both have cause to celebrate BYOA and BYOC
Jan Stafford explores the benefits and challenges of the 'bring your own applications' (BYOA) and 'bring your own cloud' (BYOC) trends.

BYOC fosters employee innovation and independence
There are many security concerns with the bring your own cloud and other BYOD trends, but what about the benefits? Look at the upside of BYOC in this tip.

Fill tech gaps in bring your own cloud with cloud services
While BYOC, like BYOD, is generally a balance of cost advantages versus security/compliance risks, there are cloud trends that could upset the balance, and BYOC planners need to watch them.


BYOD (bring your own device), the leader of the BYOx pack, is the increasing trend toward employee-owned devices within a business. Smartphones are the most common example but employees also take their own tabletslaptops and USB drives into the workplace.

Required reading for learning more about BYOD:

BYOD poses big security threat to micro businesses
Micro businesses with fewer than 25 employees have the same rate of mobile device adoption as large enterprises, but lack the security resources to protect users, a study has revealed.

Understanding the hard ROI of BYOD
To the untrained observer, the concept of BYOD is simple: bring in consumer devices and save money. However, this is often based on the incorrect assumption that device costs constitute a significant portion of enterprise mobility spend.

Managing BYOD endpoint security
User devices extend the enterprise to new limits, taking data and applications to those same new limits. In the meantime, securing those devices and data becomes a much more difficult proposition, not only because of geography but also because of the multitude of platforms that must be supported. 

What's the point of your BYOD program?
Thinking about a BYOD program? Make sure you know what the business value is, and that you're not just doing it to placate gadget-happy end users.


BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys. 

Required reading for learning more about BYOE:

Why is BYOE important?
In this Ask the Expert, Forrester analyst James Staten details the importance of the bring your own encryption (BYOE) fad as a cloud security model.

Encryption key management: Should keys still be stored in the cloud?
Expert Joe Granneman explains whether encryption key management in the cloud is still possible after that slew of revelations around the NSA.

Doing it right: Cloud encryption key management best practices
Expert Dave Shackleford takes a look at what cloud encryption key management is like today and what to know about cloud security providers' processes.


BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.

Required reading for learning more about BYOI:

Bring Your Own Identity Is Here! (Mostly)
Repeat after me: The future is not Bring Your Own Device; that is the present. The future is bring your own identity.

Can OAuth 2.0 strengthen authentication? 
Learn what Open Authentication or OAuth 2.0 is, its risks and rewards, and how it differs from bring your own identity.

Cloud single sign-on adds convenience, but does it sacrifice security?
Cloud single sign-on (SSO) gains popularity as companies adopt applications using multiple cloud services. But don't jeopardize security for convenience.


BYON (bring your own network ) is the ability of end users to create or access alternative networks when the available options are not satisfactory for their purposes. 

Required reading for learning more about BYON:

First BYOD, now BYON poses security challenge
Like bring your own device (BYOD) before it, the march of bring your own network (BYON) is happening silently, stealthily and almost completely outside of management control.

Planning for the future of mobility: A BYOD guide for enterprise CIOs
In this CIO Essential Guide, learn how IT leaders are planning for the future of mobility, aligning consumer devices with bring your own technology trends.

Approaching BYO Wi-Fi hotspot trend, packet capture tips
Read about the risks and benefits of the BYO access point trend and get advice for timing packet capture.


BYOSM (bring your own smart machine) is a policy that allows employees to use their own smart machines  -- robots and cognitive computing systems, for example -- in the workplace.  

Required reading for learning about BYOSM:

Understanding the emerging role of smart machines
Smart machines may be in their infancy, but machine intelligence could have a profound impact on IT and business operations in the future.

Smart robots pave way for better human-machine collaboration
Robots will find a place in the enterprise, but can we trust them? Here's how they will impact the role of IT.

The rise of the smart machines: Here comes the robo-workforce
Smart machines are all over the news and eyeballing human jobs.  In case they're listening, let's make one thing clear. Robots are awwwesome!


BYOT (bring your own technology) is a policy that allows employees or students to use their own personal electronic devices and applications at work or school.

Required reading for learning more about BYOT:

BYOT: Where does it fit into future IT trends? 
In a SearchCIO tweet jam recap, participants suggested current trends toward bring your own technology would continue to offer unique opportunities for enterprise IT departments, but also raise new management headaches.

Unraveling BYOD/T
Opinions and views, recommendations and pitfalls, management tools and security concerns, the endless list continues to keep the CIO bewildered, irrespective of whether s/he embraces BYOT or not.

Planning for the future of mobility: A BYOD guide for enterprise CIOs
For this CIO Chatter, SearchCIO polled readers on whether BYOD is a passing trend or the future of IT. It turns out that BYOT management remains a high priority.


BYOW (bring your own wearables) is a trend toward the use of employee-owned wearable computing devices, such as such as fitness and health monitors, smartwatches and smart eyewear, in a business setting. 

Required reading for learning more about BYOW:

The business value of wearable technology
New wearable technology uses are permeating the enterprise. CIOs can boost employee productivity and derive business value from customer interactions.

Wearable computing technology: What about all that data?
If your organization uses wearable computing technology, odds are you produce a whole lot of data. How can CIOs keep that data actionable and secure?

Can wearable tech fit the business agenda?
Over the next few years wearable technology is expected to make an impact in the consumer and enterprise market. CIOs should consider the implications.


BYOx (bring your own everything) is the all-encompassing term that ties all the foregoing trends together -- because, after all, many enterprises are dealing with all of them.  The trend is sometimes just called “BYO” and is sometimes said to stand for “bring your own anything.”

Required reading for learning more about BYOx:

Four tips from a reformed CTO for making the most of BYOx
If CTO Niel Nickolaisen saw a rogue application, he would crush it. If he spied an unauthorized device connecting to his network, he shut down the attempt. That was then. Now he's living the BYOx life.

BYOx complicates infrastructure for IT pros
BYOX, mobility and cloud computing are the emerging technologies judged most disruptive to IT organizations, according to a survey of IT professionals.

Governance structures for the BYOx era
Bring your own anything is suffusing the enterprise, and CIOs are pursuing new governance structures to tame the mobile chaos.

This was last updated in March 2015 ???publishDate.suggestedBy???

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close