Infrastructure Operations icon

Consider BYOC as Part of a Desktop-as-a-Service Strategy

Developing a model for desktop computing without desktop asset management is the vanguard of IT-as-a-service.


This content requires an active subscription.

Access this content by logging in with your Info-Tech Research Group membership or contacting one of our representatives for assistance.

Speak With A Representative Sign In
or Call: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)


Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

View Storyboard

Solution Set Storyboard thumbnail

Your Challenge

  • Despite early resistance, consumer technology is infiltrating the enterprise and has taken a firm hold. The proliferation of employee-purchased smartphones, tablets, and netbooks has organizations looking beyond the pocket to the desktop.
  • With the rise of desktop virtualization and cloud applications, the IT department is moving to a service orientation rather than being focused on assets. Divesting the organization of corporate-owned laptops and desktops and allowing employees to bring their own devices is another step toward service-minded IT.
  • Of course, there are risks involved that must be addressed in order to accomplish this cultural shift successfully. All employees must be on board with protecting their physical property and organizational data.

Our Advice

Critical Insight

  • Unmanaged devices have been a challenge for IT for several years now, and the trend shows no sign of slowing down. More and more employees are bringing personal devices to work; IT must stop resisting this influx and start designing a strategy to manage it.
  • Desktop virtualization isn’t the only enabler of Bring Your Own Computer (BYOC). Mobility, Web apps, and cloud-based services also play a large role.

Impact and Result

In order to achieve a Bring Your Own initiative, organizations must:

  • Develop a model that will work with the infrastructure without creating more work and risk for the IT department.
  • Set guidelines and restrictions that outline standards for required applications, maintenance expectations, and company data mobility, among others.
  • Set a reasonable stipend amount that covers the requirements for the business.

Research & Tools

1. Understand the management implications of BYOC.

Determine if BYOC is right for your organization.

2. Understand current capabilities and readiness for BYOC.

Decide for what kind of BYO program the organization is ready.

3. Set out roles, responsibilities, rights, and limitations.

Establish clear expectations for all aspects of the BYO program.

4. Communicate the BYOC plan and related policies.

Promote a well-managed, successful adoption.

5. Document policy position and rationale for the business.

Ensure all parts of the business are in agreement on the current status of BYOC in the organization.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on this topic.

You can start as early as tomorrow morning. Our analysts will explain the process in your first call.

Get advice from a subject matter expert.

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and setting the direction for your next project step.