Intelligent CIO Middle East Issue 05 | Page 76

EDITOR’S QUESTION HOW BEST CAN CIOs ENSURE BYOD IS BEING ADEQUATELY IMPLEMENTED ACROSS OPERATIONS WITHOUT ENDANGERING SECURITY PROTOCOLS? B YOD is currently firmly embedded in the daily lives of the modern workforce, and whether CIOs openly embrace this new trend, it is a security concern that cannot be ignored. An enterprise must think beyond the technological challenges; it must address business policies, legal policies, management processes and governance as well. The Bring-Your-Own-Device (BYOD) ownership model is no longer hype or a privilege of early adopters. According to Gartner: “By 2017, half of employers will require employees to supply their own device for work purposes.” Businesses everywhere have acknowledged the benefits that a BYOD model delivers – including [\