Custom application development and the cloud: An ideal solution to the BYOD security problem

Posted by Justin Hesser on March 29, 2013

The proliferation of the bring-your-own-device (BYOD) model is possibly the biggest business technology story this year. This blog touched on the concept of BYOD earlier this month, but some of the strengths and weaknesses of the strategy are becoming more apparent.

The shift from traditional desktop to PCs to modernized mobile devices began to take place a couple of years ago, but as the technology continued to evolve, many corporations began to realize something – consumer technology was outpacing business solutions.

Today, people stand outside for hours in line just to get their hands on the latest iPhone, Android or, if the folks at the company formerly known as Research in Motion have anything to say about it, the BlackBerry. The features and functionality of these devices have caused price tags to skyrocket, and many companies struggle to keep up. So, instead of deploying a few second-rate handheld devices to employees, many businesses have decided to optimize the resources at their workers’ disposal by allowing them to bring their gadgets into the office.

Doing so reduces spending and builds efficiency, perhaps the two biggest factors driving the majority of business decisions ever year. So, why doesn’t every organization adopt this policy? The trouble is, many companies have a difficulty entrusting employees to store data on their personal devices.

However, the benefits of using a high-powered personal device are too important to pass up. This blog’s aforementioned previous entry suggested building a custom database software system to help manage information on personal devices, and FileMaker is the program to help businesses get there.

In addition to providing the tools companies need to develop strong software programs to run on iPhones, Androids and any other personal mobile device, FileMaker can allow organizations to host their apps in the cloud. That way, individuals with powerful smartphones and tablets can use their devices’ internet capabilities to access information from the cloud. This is an ideal solution because it capitalizes on the advantages of using personal devices without damaging a company’s security efforts.