Just a nit pick, BYOD is when a employee brings his/her own device to work in order to use it to do work. At some places it's viable to let employees choose the tools that work best for them, and not force every employee onto the same 6 pound HP or Lenovo or Blackberry.
New and improved provision schemes will make this even more viable in the future, where applications and data that belongs to the employer can still be kept reasonably secure no matter who owns the hardware.
It's an interesting area. I don't think BYOD has the rosy future the breathless posts on LinkedIn will have me believe. The problem is one of security. If I'm going to enforce security on a device I will need to wipe/reset the BYOD phone and apply my enterprise policy (password on start, device encryption, find-my-phone, remote wipe and so on).
At the other end of that equation you have a consumer who has a shiny new phone, and is being asked by her employer to yield control of the new shiny to the enterprise. Not appealing, when said consumer foots the bill for the phone, data and calls.
That conflict will result in CYOD (choose your own device), I think. And if we get a company phone, will mean we walk around with two phones. One fore work, locked down and able to access corporate email and SharePoint, the other for play, which has no corporate policy applied to it and only has Internet access.
> If I'm going to enforce security on a device I will need to wipe/reset the BYOD phone and apply my enterprise policy
Which is exactly what happens in a BYOD scenario and the process is getting better for both employees and employer. For example, my employer can now "wipe" all my corporate data on my iPhone while leaving all my personal data intact. Of course, as long as I have their data the security policy (password on start, device encryption, etc) is enabled.
We do have CYOD but we only facilitate the connection between the employee and the provider -- the employee owns the device. Mobile devices are very personal things and nobody wants to carry two of them.
New and improved provision schemes will make this even more viable in the future, where applications and data that belongs to the employer can still be kept reasonably secure no matter who owns the hardware.