What BYOD is…and what it isn’t

BYOD – or Bring Your Own Device – is what happens when your employees or students or guests use their own personal, laptop, smart phones and tablets for work. They bring their own mobile apps… security risks… privacy demands…with the intent to connect to your enterprise. And they expect you to make it work. Because it’s their own the device, uniformity goes out the window. BYOD means that hundreds or thousands – or tens of thousands – of essentially rogue devices are interacting with your organization’s confidential data and coming into your buildings every day…and it means that you need to come up with a plan that protects your confidential data and is transparent to users.

Why should I care?

Because all those users with their personal (mobile) devices are incredibly valuable to you. They’re your brain trust…your engine…your heart and soul. And they want to work the way they want things to work. BYOD – done right – lets them do that. It can unleash new levels of productivity and operational agility. It let’s your employees work and students learn with the technology that they’re most comfortable with and that suits their exact requirements.

What is the impact of BYOD?

Instead of sharing a laptop in class, a third-grader checks in to her own reading assignment on her own personal tablet. A marketing manager turns around a same-day niche opportunity – from his personal iPad mini, while in a staff meeting. An executive responds to a strategically critical email from the Shanghai office – on his Android Fire. Thousands of times a day, these opportunities crop up –without BYOD, they would go unnoticed, unexploited, undeveloped. The opportunity costs are virtually infinite.

What exactly Do you lose if you don’t move to BYOD?

To put it bluntly: your ability to manage risk. As users increasingly combine work and personal applications on their devices, your management challenges grow more complex – and the chance that confidential data are leaked rises exponentially. Devices are replaced, and lost or stolen, without IT being informed. Documents are not encrypted, but then stored in personal cloud applications. Jailbroken devices are infected and then connect to the network, which can have a detrimental effect on other users’ data.

Who’s getting the most of it…so far?


Higher education practically invented BYOD. Colleges and universities have had to support student-owned devices for many years and have done an excellent job leveraging BYOD to transform the teaching and learning environment. Now, these same institutions are extending BYOD to faculty and staff.


Everyone wants to stay connected to the office now. So enterprises are leveraging authentication methods and policies they currently use for IT-managed laptops, and extending them to personal devices. BYOD has shifted the security paradigm though: from managing every aspect of the device, to just managing enterprise apps and data, such as email and attachments.


Given all of the sensitive information and regulatory requirements at hospitals, it may be the last place you might expect BYOD to be embraced. However, a growing number of doctors and staff are using mobile devices for tasks such as patient monitoring, asset tracking, and consultation.

Is BYOD for everyone?

BYOD doesn’t discriminate on the size of an organization. Even small organizations will need to support personal devices and the daunting data-protection mandates.

Airowire Networks provides next-generation network access solutions for the mobile enterprise. We follow and implement Mobile Virtual Enterprise (MOVE) architecture unifies wired and wireless network infrastructures into one seamless access solution for corporate headquarters, mobile business professionals, remote workers and guests. This unified approach to access networks dramatically improves productivity and lowers capital and operational costs.