• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 11, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Understanding the Full Scope of the BYOD Opportunity for Carriers

Understanding the Full Scope of the BYOD Opportunity for Carriers

January 3, 2013
in All
A A

by Ray Greenan, Global Marketing Director, Symantec Communications Service Providers

Over the past couple of years mobility has become one of the
most important business and IT strategy topics, and the focus on it is only
going to increase in 2013. It has also become increasingly difficult to have a
discussion on business mobility without it including the bring your own device,
or BYOD trend.

In fact, recent research by analyst firm Ovum indicates that
by 2017, there will be 443,939,000 BYOD mobile connections worldwide. This
number is impressive on its own, but is even more striking when it is compared
to Ovum’s estimate that there will be 532,778,000 corporate-liable mobile
connections worldwide by 2017 as well. Thus, in just five years from now there
will be nearly as many employee-liable devices moving in and out of corporate
networks as there will be corporate-liable devices.

At first glance, the concept of BYOD is quite simple: Allow
employees to supply their own devices, thereby increasing employee satisfaction
and hopefully reducing capital – and perhaps even operational – expenditures.
Generally, and especially for the purposes of this article, the “device” in
BYOD refers to mobile devices, particularly carrier network-connected connected
smartphones and tablets.

However, for all its potential benefits BYOD also creates
security and management challenges. After all, at the end of the day, BYOD
involves IT relinquishing at least some control over the devices connecting to
corporate networks, resources and data. As always, there is some risk when
relinquishing any such control.

Because of this, impressions of BYOD range from company to
company, with some embracing it wholeheartedly, some remaining cautiously optimistic
and some still approaching the topic with outright reproach. That said, there
is also a common belief among nearly all of these organizations: BYOD in some
form or another is largely inevitable.

Nonetheless, companies realize that BYOD within their
organizations is going to happen whether they promote it or not, thus many are
coming to the conclusion that they can at least make it on their terms. This
involves efficient enabling of employee-liable devices, establishing strong policies
for their acceptable use and utilizing technology to enforce those policies and
secure mobile devices against a myriad of threats, from loss or theft to
malware.

When all of this is taken into account, there are many
companies that simply either cannot or do not want to assume this burden. Some
of these are enterprise-class organizations that are finding it more
financially viable to outsource the management of their mobile infrastructure,
while many others are small- to medium-sized companies who do not have the resources.
After all, SMBs often already have their hands full with managing the demands
of their traditional IT infrastructure and endpoints. Add mobility and BYOD to
the mix and often overtaxed IT staffs become spread even thinner.

This is all excellent news for the wireless
telecommunications industry. Why? Because herein lies a tremendous opportunity
for carriers who have developed a trusted network to step into the role of
managed service provider for companies such as those described here. And while
some are already doing this to a degree, there is much more opportunity than
first meets the eye. In fact, there are five specific areas of business mobility
carriers should seek to address on behalf of their customers. 

These include:

App and Data Protection

Business data must be protected at all times. This is a
primary objective of any IT organization, and the reason that most IT
technologies exist in the first place. 
Mobile apps are the primary method to access, view, store and transmit
that data, so both apps and data must have controls and protection appropriate
to the company and industry.

User and App Access

At all times, the people, the apps and the devices that are
connecting to, and accessing, business assets must be identified and validated
as authorized business participants. Identity is the first and most important
component to any IT strategy, especially where mobility is involved because device
and cloud access is not inherently as strict.

Device Management

Devices that access business assets and connect to company
networks must be managed and secured according to applicable company policies
and industry regulations. Every company should establish appropriate mobile
policies, and those should be applied to all managed devices.

Threat Protection

With the incredible growth of mobile devices, they are
rapidly becoming a key target for cyber criminals. Protecting devices and the
apps and data on them is paramount to secure business data. Good threat
protection should protect from external attacks, rogue apps, unsafe browsing
and theft.

Secure File Sharing

Although mobile access, storage and sharing of files is not
a challenge unique to mobile, the fact that a mobile device is typically one of
multiple devices a user may have, the cloud is the obvious and simple solution
for distributing and synchronizing information across devices. Businesses
should have full administrative control over distribution and access to
business documents on any network, and especially in the cloud.

While some carriers have begun to step into the role of
managed service provider in some of the areas above, none have addressed all
five areas. They are not offering a holistic managed security and management
experience. Carriers would do well to expand their services offerings and the mobile
security and management market has matured to the point where effective,
scalable solutions are available to help them do this. Doing so will not only
benefit their customers, but their bottom lines as well.

About the Author

Ray Greenan, Global Marketing Director, Symantec Communications Service Providers, is responsible for strategy and implementation of Symantec marketing solutions designed to help Communication Service Providers transform their networks and businesses to deliver new applications and services to their customers in a secure and reliable way.

Prior to his current position, Greenan spent 14 years at IBM where he held multiple positions including Global Marketing Executive, Service Delivery Platforms which focused on IBM’s Service Provider Delivery Environment, SPDE and Marketing Program Director for the IBM Green Data Center group which focused on Green Technology and Sustainability for the Utility market and its customers. He also held the position of Power Marketing Program Director responsible for strategy and execution of marketing programs for the Greater China Region for IBM¹s Power Architecture and

IBM’s membership within Power.org.

Greenan was awarded a Masters in Business Administration in Management Information Systems from Manhattan College, where he also received his Bachelor of Arts in English. He has also earned certification from NJIT for Sustainable Design and Green Technology.

About Symantec

Symantec protects the world’s information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.

Tags: BlueprintBlueprint ColumnBlueprint columnsMDMMobileService Providers
ShareTweetShare
Previous Post

Mobidia: LTE Drives Significant Data Growth

Next Post

ZTE Wins Cloud Computing Contract with China Telecom

Staff

Staff

Related Posts

Blueprint: Super-Coherent Optics for the Long-Haul
Blueprints

Blueprint: Super-Coherent Optics for the Long-Haul

August 27, 2023
Blueprint: Brazil looks to municipal Wi-Fi 6E
Blueprints

Blueprint: Brazil looks to municipal Wi-Fi 6E

February 21, 2023
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
T-Mobile builds cloud native 5G converged core with Cisco
All

T-Mobile builds cloud native 5G converged core with Cisco

December 15, 2022
Next Post
ZTE Wins Cloud Computing Contract with China Telecom

ZTE Wins Cloud Computing Contract with China Telecom

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version