{"id":31562,"date":"2019-04-24T03:23:14","date_gmt":"2019-04-24T07:23:14","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31562"},"modified":"2019-04-24T03:23:14","modified_gmt":"2019-04-24T07:23:14","slug":"as-enterprise-device-choice-grows-so-should-a-cyod-strategy","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/04\/24\/as-enterprise-device-choice-grows-so-should-a-cyod-strategy\/","title":{"rendered":"As enterprise device choice grows, so should a CYOD strategy"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.techtarget.com\/contributor\/Jesse-Scardina\">Jesse Scardina<\/a> &#8211;  Between Windows and iOS, iPhones and Androids, tablets and Chromebooks, and a future that includes more IoT devices, a\u00a0<a href=\"https:\/\/whatis.techtarget.com\/definition\/BYOD-bring-your-own-device\">BYOD<\/a>\u00a0strategy can be challenging to implement. <\/p>\n\n\n\n<p>With\u00a0<a href=\"https:\/\/searchhrsoftware.techtarget.com\/definition\/employee-experience\">employee experience<\/a> becoming increasingly important for organizations, IT has little choice but to provide the option of using the laptops, smartphones and operating systems employees choose.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/04\/business-3370832__340.jpg\" alt=\"\" class=\"wp-image-31563\" width=\"279\" height=\"181\"\/><\/figure><\/div>\n\n\n\n<p>That&#8217;s why enterprises are leaning away from allowing employees to bring their own devices and toward a choose your own device (<a href=\"https:\/\/searchmobilecomputing.techtarget.com\/definition\/CYOD-choose-your-own-device\">CYOD<\/a>) strategy, according to Steve Brasen, research director at&nbsp;Enterprise Management Associates Inc.(EMA), a Boulder, Colo.-based enterprise research firm.<\/p>\n\n\n\n<p>&#8220;It&#8217;s been 11 years since the iPhone came out, and that kicked off this digital revolution,&#8221; Brasen said, adding that mobile innovation in the last decade has caused a shift for IT admins, who used to worry about managing a PC or desktop.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/searchmobilecomputing.techtarget.com\/feature\/As-enterprise-device-choice-grows-so-should-a-CYOD-strategy&amp;ct=ga&amp;cd=CAEYByoUMTI1NjI5MTk2NzIwODc4MzQ2NTgyGmEwZjZmYzc3MGFiYjQwNTQ6Y29tOmVuOlVT&amp;usg=AFQjCNFjGv63tJMcj_r22O3TjZ9n6ulGIQ\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jesse Scardina &#8211; Between Windows and iOS, iPhones and Androids, tablets and Chromebooks, and a future that includes more IoT devices, a\u00a0BYOD\u00a0strategy can be challenging to implement. With\u00a0employee experience becoming increasingly important for organizations, IT has little choice but <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/04\/24\/as-enterprise-device-choice-grows-so-should-a-cyod-strategy\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[66],"tags":[668,151],"class_list":["post-31562","post","type-post","status-publish","format-standard","hentry","category-tablets","tag-devices","tag-tablets"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31562"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31562\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}