Loading...

17 Dec 2025 18:29

Mobile & Digital

Going to the Office? BYO Apple Watch

The launch of the Apple Watch heralds the transformation of BYOD into BYOX. How can businesses accommodate #GenMobile’s adoption of wearables, while still staying in control?

“Gorgeous”. “Beautiful”. “Actually useful”. “Epic”. The accolades from the reviewers of the Apple Watch keep pouring in, and the new device – though not the first of its kind in the market – holds the potential of becoming as ubiquitous as the iPhone or the iPod.

However, the expected popularity of the Apple Watch raises interesting challenges for CIOs and IT managers. The Apple Watch is merely a herald of an expected tsunami of BYOD smart devices and Internet-of-Things wearables into the workplace, potentially opening up new risks to corporate data privacy and security.

It’s highly likely that the first Apple Watches in the workplace will be personally owned. Yet, these devices will be able to interact with corporate networks; and access, download and store company data. Other wearables (not the current version of the Apple Watch) come with built-in cameras. In fact, one of the more interesting features of the Apple Watch is the ability to tether to, and control, iPhones over a remote connection.

IT departments will be understandably worried about the impact of the Apple Watch on the workplace. Even though many organisations have already adopted BYOD policies, several new conundrums will pop up.

At the very top of the list: is it appropriate to allow wearable devices to connect to enterprise networks? What if the device is already tethered to a smartphone that has already been given access?

Bear in mind that, according to a study[1] by Aruba Networks, the new generation of employees – dubbed #GenMobile – expect mobility at the workplace to be a given, so any blanket decision to ban such devices from the workplace will be highly unpopular. In fact, almost two thirds of study respondents say they use mobile devices to help them manage their work and personal lives better. 

If the decision is made to accept Apple Watches and other wearables into the organisation, will existing BYOD policies that govern the use of corporate data be enough – will new policies be required?

When tinkering with these policies, CIOs have to keep in mind the fact that there will be other IoT-based devices coming along that could be embedded into an employee’s clothing or even office pantry appliances. In fact, the acronym “BYOD” will soon have to be replaced with “BYOX”, with the “X” symbolizing “practically anything”. 

Once policies have been amended appropriately, then – and only then – can CIOs turn their attention to the underlying communications network. Many IT organizations have already put in place solutions that can secure any mobile device that connects to corporate Wi-Fi; giving them complete visibility of the number, type and frequency of mobile devices assessing their network. What’s more, these platforms are also capable of enforcing flexible security policies that are capable of analysing – and acting on – the context of how an employee uses the mobile device. For instance, an employee using an Apple Watch at a coffee shop to access corporate data may not be granted the same level of access as one who uses a PC during office hours. Depending on the context, different policies can be applied to make sure that the right balance between flexibility and security is met.

Given these considerations, CIOs will need to skilfully juggle the competing requirements to arrive at an enlightened BYOX policy that is most appropriate to company’s needs. The Apple Watch certainly won’t make that juggling act any easier. But it will certainly make it more beautiful.

NULL
(Visited 18 times, 1 visits today)
peri hokiperihokiduta76duta 76laporan rtp live mahjong wild 2 buktikan ritme menang dan pola mendalam duta76mahjong ways 2 pgsoft review duta76 kelebihan kekurangan potensi mudah maxwinjangan remehkan pola biasa mahjong wins 3 justru itu kunci trigger scatter hitampanduan melihat rtp live mahjong wild deluxe dari pola teratur dari perihokibongkar rahasia buktikan sendiri keaslian mahjong ways 2 pgsoft perihoki tanpa ragumenurunkan tekanan putaran justru membuat pola menang mahjong wins 3 lebih terjagabaca rtp live terbaru dengan presisi tinggi langkah mudah yang bakal mengubah pandangan andarahasia grid animation bagaimana perubahan mengubah scatter berantai di wild bountystrategi cerdas scatter hitam rahasia analisis profesional mahjong waystransisi segmen bermain titik kritis yang mengubah pola kemenangan di mahjong winswild bounty transisi waktu dan scatter fluktuatif yang menggugah emosi andaflow mahjong ways indikasikan awal pergeseran momentum besar yang mengejutkaninovasi mengejutkan evaluasi komparasi pragmatic play ubah wajah evolusi desain gamerahasia pola stabil dalam mahjong ways 2 strategi cerdas untuk tingkatkan kemenangan andastrategi analisa baru mahjong wins 3 pragmatic taktik rahasia yang mengubah cara bermainwild bounty meroket pola inovatif yang mengubah cara anda menyelami dunia produktifinovasi mengejutkan evolusi algoritma pragmatic play hadirkan perubahan halus pada mekanisme tumble terbarukejutan mode ekspansi wild bounty ungkap aktivitas intens yang misteriusrahasia data rtp live mengungkap cara cerdas optimalkan putaran pgsoftstrategi raih cuan maksimal di live baccarat yang belum banyak diketahuitekanan spin melonjak kombinasi mini mahjong pragmatic terpukulhasil permainan terstruktur rtpintensitas wild mahjong awsbetmekanisme scatter merah awsbetanalisis teknis auto spin mahjong ways panggil scattercara bermain mahjong wins jam mati rtp live naikupdate khusus scatter mahjong ways pola menang konsisten Top