BYOD = Bring-Your-Own-Device or Bring-Your-Own-Disaster? Part2

iPad users prefer root canal to seeing device destroyed

In part one of Bring-Your-Own-Device or Bring-Your-Own-Disaster blog I talked about challenges that I have seen in BYOD projects. The organizational challenges like Service Desk processes, License Management challenges and Tax issues are a lot of times bigger in those projects than the technical challenges. That’s why I see a lot of initially started BYOD projects turn into Choose-Your-Own-Device (CYOD) or Corporate-Owned-Personal-Enabled (COPE) projects. The device ownership should be irrelevant from an IT Management perspective, because your management solution should be flexible enough to support the reality out there, which means that personal and corporate data sits side by side on mobile devices. Regardless of the device ownership.

In part two of this blog I would like to cover a few technology approaches to manage BYOD or COPE.

Is there a holy grail technical solution for BYOD?

The key management paradigm in BYOD and Enterprise Mobility Management (EMM) in general is obviously management of Apps and Data and not the device anymore. Who will allow IT to lock down his personal device to access corporate Apps and Data? I guess nobody. So there must be smarter ways to manage the new work-style. An EMM solution needs to provide big value for users and improve their work-life. Otherwise they won’t accept or use any mobile management solution. Especially not on their personal owned device.

Customers currently try to solve the technical BYOD challenge with different management solutions like Enterprise Mobility Management (EMM) incl. Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Information Management (MIM) or even Application- and/or Desktop Virtualization. Some customers are looking on Smartphone Virtualization to solve BYOD, too.

BYOD User ExperienceThe problem that I see with all those management solution is that they do not solve BYOD completely or they provide the user a disruptive, unnatural user experience with their mobile devices. If you want to increase security of apps and data to a maximum in mobility, than flexibility and end-user experience suffers and vice versa.

Mobile Application Management (MAM)

MAM solutions are focusing on managing the applications rather than the device. Depending on the technology approach MAM solutions are a good fit in BYOD projects. Companies like App47, Apperian are in this space from the beginning, but almost every MDM vendor incl. AirWatch, MobileIron, Good Technology, Zenprise (Citrix XenMobile) understands now that management of apps and data is more important than managing or locking down the device. MAM solutions are using App-Wrapping, Containerization or an SDK approach to control applications via policies and isolate them from personal apps like Dropbox etc. But MAM and also MDM should only be seen as one feature of a broader EMM solution.

Smartphone Virtualization = disruptive UX?

Smartphone Virtualization is a good example for disruptive user experience in BYOD. Solutions like CellroxVMWare Horizon Mobile or RedBend separate the corporate image completely from the personal image on Android devices to maximize security and isolate personal stuff from corporate stuff, but this comes with a price. End User experience. I want to have my Facebook or Dropbox account next to my corporate E-Mail or CRM. If I have to switch over to my personal persona to do my personal E-Mail, then this feels unnatural and disruptive. I would like to see a solution that provides seamless User Experience and access to apps and data, but still provides high level of security.

Dual-Persona Management = schizophrenic?

I have always asked myself when the OS or Hardware vendors will finally provide a built-in capability to securely use personal stuff and corporate stuff on the same device without disrupting the user experience. The latest announcement from Hardware manufactures about Dual-Persona Management seem to bring us closer to this.

Blackberry – resurrection in mobility?

Blackberry was the first vendor who has introduced a built-in dual-persona capability to address the BYOD challenge with their Blackberry 10 OS several weeks ago. It is a good approach, but it still has this disruptive User Experience. Further more I guess Blackberry’s image is their biggest problem, which means that the Blackberry device is probably not the first users choice in a Choose-Your-Own-Device (CYOD) and definitely not in a Bring-Your-Own-Device (BYOD) program. I personally believe that Blackberrys public image is worse than their current products. When I had my hands on a Blackberry 10 device I found it pretty cool. They have some very clever productivity features included in their Blackberry 10 OS.

Samsung Knox – Is Enterprise Gold (Apps + Data) finally secure?

Samsung has recently announced their Samsung Knox feature, which I’m pretty excited about. It provides a dual persona functionality on Samsung Android devices, which enables user to switch between a personal and a corporate profile on demand. It is a secure separation of Apps and data on Samsung devices. It also includes some clever convergence features. E.g. the calandar that can show me personal and corporate appointments in a unified view, but still has the appointments technically isolated and secured from each other. But the best part is, that Samsung understood that this technology can only be successful, if the IT Management ecosystems has the ability to use and to support it. Samsung provides 800+ API’s for Mobility Management which I believe will make this functionality a winner in companies, because I guess all the EMM vendors will jump on it as soon as we see more traction of Samsung Knox on the customer side.

During Mobile Word Congress in Barcelona a few weeks ago almost every hardware manufacturer told me that they work on something comparable to Samsung Knox. This is good for enterprises and the managebility of Android and BYOD. But BYOD is often called BYOA (Bring-Your-Own-Apple) for a good reason. So the big question will be what Apple is doing in dual persona management. We will see…

What do you think? Which technology approach fits best to manage BYOD?


This entry was posted in Strategy and tagged , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s