Short for Bring Your Own Applications as well as Build Your Own Apps, BYOA is an evolution of the term BYOD (Bring Your Own Device) in the consumerization of IT that refers to the growing use of personal apps by employees for increased productivity in their work environments.
Examples of Bring Your Own Apps span the gamut of third-party cloud storage and sync applications such as Dropbox, collaboration apps like Skype and GoToMeeting, work productivity apps like Google Docs and Evernote and social networking apps like LinkedIn.
Potential Security Issues with BYOA
With employees increasingly using their own smartphones, tablets and other computing devices at work, the use of employee-introduced applications has proliferated as well, with many organizations concerned about the security of the critical data used within these apps as well as the potential lack of control and management over BYOA apps.
As a result, while BYOA can increase workforce productivity and employee engagement, as well as reduce capital expenses and training costs associated with software, it can do so at the risk of corporate security if security policies and best practices are not properly implemented and followed.
The challenge for many companies and IT corporate leaders with both BYOA and BYOD has become striking an ideal balance between providing employees with the flexibility and ease of use via BYOA and BYOD to maximize productivity, while ensuring governance and security over the use of employee-introduced apps and devices.
Embracing the BYOA App Culture and In-House App Stores
Some larger companies are more embracing of the BYOA “app culture” and have taken the approach of enabling employees to build their own apps or even setting up their own in-house app directories of approved BYOA apps. These corporate BYOA app stores enable employees to access the apps that help them be the most productive while reducing the potential for use of unapproved apps.
Bring Your Own Access
While not as common, BYOA can also mean Bring Your Own Access, a term that refers to remote and home office employees being responsible for managing their wireless remote access to their company’s network.
- the iPad Pro
The Apple iPad Pro is a larger version of the original Apple iPad that the company announced on September 9th, 2015, with retail availability expected later in November of the same year. While the original iPad’s screen measured 9.7 inches, the iPad Pro is a 12.9-inch tablet with 2,732 x 2,048 pixel resolution that is […]
- Android Marshmallow
Marshmallow is the official Android codename for the upcoming 6.0 update of the open source Android mobile operating system. Marshmallow was first announced at Google I/O in May 2015 as the Android M release, and the mobile OS is expected to make its official debut in October or November 2015 as the successor to the […]
- Personally Identifiable Information (PII)
Personally Identifiable Information, or PII, refers to information or data that can be used to discover or distinguish an individual’s identity and specific details about the individual. While definitions for PII vary slightly, the National Institute of Standards and Technology (NIST) specifically defines personally identifiable information as: “any information about an individual maintained by an […]
- a Micro-VM
The operating system is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs and applications. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and […]
- Windows Bridge for iOS
Windows Bridge for iOS is a tool developed by Microsoft for bringing Apple iOS apps to the Windows platform. Microsoft first announced the open-source Windows Bridge for iOS technology at its Build 2015 conference in April 2015, and the company debuted an early “Developer Preview” version of the technology later in August of the same […]