BYOD—Coming To a Workplace Near You
The Shift to BYOD
There is a shift that is taking place—a shift in the corporate world; and it’s impacting the way employees think, feel and perform. It has to do with the rise of BYOD (Bring Your Own Device) to the point of being an accepted standard without, as of yet, becoming official protocol– not only in corporate culture but in how core IT systems are delivered.
BYOD—It Aint Going Away!
Despite the reason why employees choose to use their own gadgets in lieu of company-provided laptops or other mobile devices, the point is, corporations are faced with the realization that this type of situation isn’t going away and management must decide how to deal with it—embrace it fully; embrace it partially? Reject it altogether?
Here’s an interesting statistic from Gartner:
“….by 2014, 90% of organizations will support corporate applications on personal devices and this isn’t just a single device per employee.”
It seems organizations are leaning towards placing a restriction or two into the mix by creating a compromise, if you will. Instead of allowing BYOD to run amuck, it’s beginning to show signs of morphing into CYOD—Choose Your Own Device. This concession gives IT personnel more control where they can permit a few chosen devices for employees to utilize, instead of having to deal with virtually any device an employee might decide to bring into the workplace.
Implementing a policy that embraces either BYOD or CYOD, does have the following benefits:
- increased productivity
- decreased company expenditures
- more flexible workforce
How Is Security Impacted?
Though there are some very real advantages to incorporating BYOD for employees, there are, also, concerns that must be addressed; and security is one of them. Interestingly, if you were to look on Twitter you would notice that each #BYOD tweet is either followed by, or preceded by, some type of security reference. Yes, security remains a crucial issue regarding BYOD where a whole new array of devices would be supported, thereby, increasing the chances of an organization’s data being compromised.
BYOD incorporation would demand significant changes regarding integration with existing IT infrastructure. It goes without saying that employees are on the cusp of insisting to use their IOS mini tablets, Android mobiles or Windows devices to take on the work their company-supplied devices normally would do. For the IT staff, this presents a real pain in the brain; after all, dealing with a single type of device is one thing, but a whole array of devices?
There’s also a capability issue. A number of core business IT functions and applications are typically run on a zEnterprise z/OS system, accessed via well-defined asynchronous links as well as conventional and reliable security protocols. These particular applications are at least marginally outmoded—their function key, monochrome operation is no contest when compared to the most tech-advanced device-friendly interfaces.
What it all boils down to is BYOD-related challenges that place an unwelcomed burden on an already-taxed IT team. When both staff and consumers wish/insist/demand to access core mainframe applications through their own devices, it equates to increased frustration from IT– all this to support BYOD. What is one to do?
Certain Questions Arise
When you look at the entire picture, there are certain questions that beg answers:
1: How can personal devices access the applications held on the mainframe?
2: Can all types of devices access the mainframe or…does CYOD become an official, corporate inclusion?
3: Does the mainframe have the capacity to deal with all the variations and adjustments?
4: Is the mainframe format adversely affected due to a BYOD or a CYOD implementation?
Some might say the inclusion of personal devices, into the workplace, will test-the-limits of the agility of any number of critical legacy applications. Many businesses get duped into believing their green-screens (3270/5250 terminals) won’t be compatible with the employees’ more-sophisticated devices. This leads management to further believe that a rewriting of entire applications or to a purchasing of a middleware solution would become a requisite. This would prove to be time-consuming, extremely risky and cost-prohibitive.
Solution: Rocket Terminal Emulation
Rocket Mobile TE takes the fear out of BYOD for terminal emulation. With Mobile TE, there is no software to install or component to download. Configuration and security are handled through a single, centralized server, eliminating the need to deal with consumer-oriented app stores, and the license is easily expanded with a simple license key.
Click here to learn more about how Rocket Mobile TE can help your organization.