Mobile
News
4/6/2012
09:57 AM
Connect Directly
RSS
E-Mail
50%
50%

BYOD: How To Calculate Hidden Security Costs

Find the hidden costs of a bring your own device policy in order to make appropriate financial and risk decisions.

Even as bring your own device (BYOD) policies and programs have opened up a world of opportunity for organizations, the risk and additional operational burden imposed have changed the economic realities of mobility more than many in IT realize. As organizations weigh the costs and opportunities offered by BYOD compared to issuing company devices, they need to be aware of the hidden costs of BYOD--particularly within high-risk environments.

According to Rainer Enders, CTO, Americas at NCP engineering, organizations looking at BYOD only as a cost-savings initiative need to rethink that mentality.

"I think it could well be at the end of the day that BYOD devices are more expensive than if you have full control and the company owns the device," he says. "Companies sometimes only look at the cost of the device, but when it comes down to it, [BYOD] is more expensive if you look at the total picture."

According to Enders, too few organizations factor risk into their cost considerations, making it one of the most costly hidden costs if proper precautions aren't taken.

"In my mind, the biggest hidden cost lies in the worst case scenario--when bigger issues arise like a lawsuit or a major security breach," he says. "It really comes down to the standard security question about what are the assets. What do I need to protect from a company point of view. My legal situation--how is my IP sufficiently protected. I think that is where the main costs are: This is something that is often overlooked. Companies don't really do a good job at assessing this kind of risk."

As such, Enders suggests that organizations start implementing risk assessment formulas into their dollars and cents estimates for mobile costs in a BYOD model. There are other tangible costs that are often overlooked as well, many of which have to do with managing a more diverse infrastructure and enforcing security and privacy policies that will eventually reduce risks.

"From an IT perspective, the hidden monetary costs principally revolve around enforcing security and compliance at scale. In the corporate-liable BlackBerry world--which many IT organizations are now moving away from--it was relatively simple to predict and manage risk," says Dan Dearing, vice president of marketing at Enterproid.

Read the rest of this article on Dark Reading.

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dan Dearing
50%
50%
Dan Dearing,
User Rank: Apprentice
4/6/2012 | 6:39:23 PM
re: BYOD: How To Calculate Hidden Security Costs
To distill Enterproid's view on this, the hidden costs of BYOD often surface after enterprises launch their BYOD strategy using their legacy mobility management solutions that are device-centric and designed for data center deployment. The rapid scale of BYOD adoption results in a larger server footprint in the data center that is expensive to commission and deploy. Using a solution that manages the whole device also has implications for employees, with potential loss of privacy or personal data. We believe that these problems can be overcome with dual-persona technology on the device and supporting management capabilities in the cloud.

BYOD is a tool that CIOs can use to achieve a more strategic goal of letting each employee leverage mobile technology to do their job more effectively. That's a way to provide their company with new innovative ways to gain a business edge over their competition. A side discussion to this might be what is the opportunity cost of not using BYOD to enable strategic mobility for your company.
InformationWeek Elite 100
InformationWeek Elite 100
Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Must Reads Oct. 21, 2014
InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A roundup of the top stories and trends on InformationWeek.com
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.