The Latin America’s bring your own device market is estimated to grow at a CAGR of 26.7% from 2014 to 2019

The Latin America Bring Your Own Device (BYOD) market is primarily driven by increasing IT expenditure in this region

Bring your own device (BYOD) is a set of solutions, which allows employees, business partners, and other users to bring their personal devices, such as smart phones, tablets, and laptops at work, for the purpose of executing enterprise applications and access data. In recent years, a commendable growth is observed in the application of mobile devices, such as smart phones and tablets.

This has further resulted in creating a huge demand for bring your own device (BYOD) market.Security and data loss concerns are major reasons that act as market inhibitors of the BYOD market. Some organizations still hesitate to take the risk of losing its sensitive information and confidential data, which can be accessed easily by any mobile device.

This belief has restricted the widespread adoption of BYOD on a global scale. But, organizations also realise that because of the real time access to corporate information their overall productivity increases, thus triggering the market demand of BYOD.

Prominent players in this market include Alcatel-Lucent, Avaya, Inc., Air Watch, Aruba Networks, Cisco Systems, Inc., IBM Corporation, and IPASS, Inc.

Increasing IT expenditure, especially pertaining to major spending on devices such as smart phones, laptops, and other mobile gadgets that provide easy access to the internet is considered to be one of the major driving factors of the Latin America BYOD market. Even though rise in the BYOD trend enhances the mobility and efficiency of an organization, it also raises a lot of security issues.

With the advent of BYOD, critical business-related information can be accessed through mobile devices. Thus, in order to safeguard critical business information and address all security issues, organisations operating in the Latin American region are ready to expand its IT infrastructure and invest resources in developing more advanced technology of BYOD devices.

Latin America contributes to around 5.2% of the global bring your own device (BYOD) market in 2014.

Get More Information About This Report:  http://www.micromarketmonitor.com/contact/5205920696-inquery_before_buy.html

How Can Businesses Learn From Hillary Clinton’s Email Practices?

Earlier this week, the New York Times reported that Hillary Clinton “exclusively used a personal email account to conduct government business as secretary of state,” allegedly running afoul of federal laws and regulations concerning the preservation and safeguarding of official communications.

Putting aside any potential political ramifications of this issue, why should the private sector (businesses and their employees alike) take notice of this story? After all, many people have both personal and work email accounts – what is the difference if we use either for both work and personal reasons?

From a business records retention and electronic discovery perspective, such a practice can present huge risks and potential expense.

While the Federal Records Act does not apply to the private sector, some of the primary goals of the Act are to preserve and archive important records of the governmental agencies, to ensure the economical and efficient management of those records, and to keep effective controls and security with regard to the maintenance and use of those records. 44 U.S. Code § 3102.

Businesses have many of the same interests. They need to make sure that their important business documents are properly preserved and archived so that they can be found quickly later, if and when needed. They need to make sure that documents (and emails) containing sensitive business information are secured and can be accessed only by those on a need-to-know basis. And they need to ensure that their business records and data are managed in a cost-effective and efficient manner. As a result, many businesses have made significant investments in developing their own records retention policies, private computer and email systems, and IS security programs. But those efforts can become wasted when employees circumvent the system by using personal email accounts and devices to create and store work-related information.

The practice of storing work-related emails and documents in one’s personal email accounts and devices can also have a significant effect (for both the business and the individual) in the realm of electronic discovery. When a business finds itself involved in litigation, it will at some point be required to collect and produce potentially relevant documentation relating to the case. This would certainly include searching the company’s own computer systems for relevant emails and documents. However, if a key employee created and/or stored potentially relevant information outside the company’s systems and in their personal email accounts and computers, the company may be required to search for any business data in those locations, as well. This can often create significant tension between the business and the employee, who has an interest in maintaining control over the sensitive and private information, which they have now effectively intermingled with the company’s business data. In addition, the costs of performing e-Discovery collections almost always increase with each additional source of data that must also be collected, searched and reviewed. Thus, the company (or sometimes the individual) must bear an additional expense in having to preserve, collect and search for documents that now exist outside of one, centralized system.

As a result, the Hillary Clinton story can serve as a precaution to businesses that they have a strong incentive to develop policies and centralized computer/email systems, both to promote the filing of important business records in an appropriate way, and to prevent employees from circumventing that system.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Source : Mondaq-How Can Businesses Learn From Hillary Clinton’s Email Practices? by Joshua M. Hummel

Do Enterprises Really Need a BYOD Policy?

The Federal Bank started using mobile devices for accessing the corporate information from 2009 onwards. Back then the number of such devices was limited and corporate email was the first application that could be accessed through them. Today, however, the number of applications published for access on mobiles has increased manifold along with a variety of devices available in the market. This has both advantages and challenges.
K P Sunny, CIO, Federal Bank, says, “Our challenge is to ensure availability of applications on all these devices and to build a device management capability, which can enforce control on all these devices. To be on safer side, we restrict the access to information from specific brand of devices.” Further stressing the importance and criticality of the challenge of protecting data that an organisation deals with, he says that this is what will ultimately decide an organisation’s willingness to build a mobility strategy.
“Also, we are under strict regulations that mandate the need for data management and control. Any instance of data leak will be looked at seriously by the market,which in turn will affect the credibility of the organisation. Hence, there can be no compromise in building such capabilities,” adds Sunny.

There is a Gartner report that predicts that by 2017, half of all employers will require workers to supply their own devices for work purposes. According to Gartner, enterprises that offer only corporate-owned smartphones or provide stipends to buy your own will soon become the exception to the rule. As enterprise BYOD programmes proliferate, 38% of companies are expected to stop providing devices to workers by 2016 and let them use their own.

Read more at: http://computer.financialexpress.com/-Do Enterprises Really Need a BYOD Policy?

Unsecured corporate data access often the downfall of BYOD programs

Access to corporate data is a key for workers doing their jobs. But it can also be the Achilles heel for companies with BYOD programs.

In fact, surveys have shown that many employees access corporate data from mobile devices even when they are directed not to do so. Often they send this data through unsecured email or store it on public clouds.

IT has two options for preventing this from happening, explained enterprise mobility consultant Bryan Barringer in a TechTarget article.

One way to control access is deploying a mobile content management platform that keeps content secure while giving employees timely access to data from their mobile devices. An example of this would be an enterprise-level corporate file-sharing and storage system that enables employees to share, edit and store documents from their phones or tablets.

“If employees feel that they can access corporate data and systems easily from wherever they are, at any time, their satisfaction — and ultimately, customer satisfaction — will be higher than if they had to spend time in the office hunting for information,” argued Barringer.

Another way to control data access is to control devices through mobile device and application management platforms that can deny access to devices and apps deemed insecure by IT, he noted.

Vendors are increasingly offering enterprise mobility management platforms that include mobile device, application and content management under one umbrella.

“Enterprise mobility should pave the way for a more productive and satisfied workforce, but the risks are real and should not be dismissed. With the right technology and governance, approved app underuse and security vulnerabilities can be mitigated,” concluded Barringer.

Source: www.fiercemobileit.com-Unsecured corporate data access often the downfall of BYOD programs

Android for Work shapes up with new enterprise program launch

Following up Inbox’s expansion for corporate users earlier this week, Android for Work is moving back into the spotlight.

zdnet-android-for-work.png

Despite more than one billion Android smartphones in circulation worldwide, smartphones and tablets are “underutilized in the workplace,” lamented Rajen Sheth, director for product management of Android and Chrome for Work, in a blog post on Wednesday.

Android certainly has a Bring-Your-Own-Device (BYOD) presence on its own, with other mobile device management (MDM) platforms already being widely deployed, such as Samsung Knox or VMware-owned AirWatch.

Now Google is going further on its own while still touting its Android ecosystem and partner community through an Android for Work program unveiled on Wednesday.

For the best of both worlds on a single device, Android for Work can be utilized to establish “work profiles” on a smartphone or tablet.

IT departments can deploy and manage approved apps to these profiles, securing them through default encryption, enhanced SELinux security enforcement and multi-user support baked into Android 5.0, a.k.a. Lollipop.

Employees can continue to use their own personal apps and profiles with the promise that their employers can only manage work data but not view or erase personal content.

To encourage productivity even further, Google has built in a suite of business apps for email, contacts and calendar, supporting Microsoft Exchange as well as Notes for editing capabilities on documents, spreadsheets and presentations.

At the moment, Google is partnering with a number of other tech giants, from device makers to network infrastructure providers to management software and app makers to launch Android for Work. Among them include Cisco, Salesforce.com, Box, and SAP as well as dozens of other familiar brands.

Google is courting software developers with a more streamlined approach to enterprise app development, touting they only have to create a single version of any Google Play app, which can then be deployed to any Android device without alterations. Developers can also establish standard management configurations for IT policies on each app.
Are Android smartphones finally poised to conquer the enterprise?

Android has long ruled the consumer smartphone market – but can it make an impact on the business market too?
Android for Work started to take a firmer shape at Google’s annual developer summit I/O last June as the Internet giant started to blur the lines between its mobile platform and other cornerstone OS, Chrome.
Android Work for Android 5.0 (Lollipop) was designed to help IT administrators publish work apps on Google Play while also limiting access to users in a designated organization.

In November, Google took the next step by following up on its springtime acquisition of enterprise BYOD startup Divide.

Founded in 2010 by former Morgan Stanley mobile IT executives, Divide offered a service touted to both comply with corporate BYOD policies without compromising individual employee privacy and freedom with said devices.

Google took Divide on a new direction by placing it under a special “IT Preview” program in which the device running the app must first be enrolled in specific enterprise MDM platforms.

To access Divide Productivity Preview, users needed to sign up for the invite-only Android IT Preview Program, then already supported by many of those now under the Android for Work umbrella, such as VMware, Citrix, IBM and MobileIron, among others.

All Android for Work capabilities will be delivered through enterprise mobile management partners. More providers are expected to be announced soon.

Watch this video: Android for Work – IT Admin Top 10 Android for Work Capabilities

Source: ZDNet-Android for Work shapes up with new enterprise program launch By Rachel King for Between the Lines 

BYOD: What to Expect in 2015

Bring your own device (BYOD) is officially mainstream.

Although just a third of employees use their own smartphones for work-related activities now, that figure is expected to rise to over 60 per cent by 2020.

As 2015 approaches, the question is not only “What will BYOD look like in 2015?” It’s also, “How will BYOD change business practices in 2015?”

SEE ALSO: Steve “the Woz” Wozniak trolls Samsung: Sells “worthless” Galaxy Gear smartwatch on eBay

As David Willis, a vice president at Gartner, said: “[BYOD] brings more variety, but it also adds a bit of chaos.” Below are four ways BYOD will disrupt business practices in the coming year:

  1. The growth of cyber liability insurance
  2. The convergence of information and application management
  3. New employee recruiting and retention incentives
  4. Bring your own data

Read  more at: ITProPortal-BYOD: What to Expect in 2015 By Abby Perkins