July 1, 2020
3
MIN READ

Forget Bring Your Own Device, now it's Bring Your Own Software

IT

BYOD is so 2012. 2020 is the age of BYOS. We dig into what BYOS means for companies and Software Asset Management Teams.

by
Nikesh Ashar

Bring Your Own Device (BYOD) refers to being allowed to use a personally owned device for work purposes, rather than being required to use a device, such as a phone or computer, provided by your company.

BYOD really begun taking off in 2012 and it has now exploded with 75% of smartphones used in companies being a personal device according to Gartner’s Competitive Landscape: Managed Mobility Services.

Bring Your Own Device Google Trends
Google Trend data for searches of 'Bring Your Own Device' began accelerating in 2012

The challenge of supporting BYOD for companies, Software Asset Management teams and their CIOs is well documented. Information security, access control and leaver/joiner processes are all made more challenging by people using their own devices. But the complexity of managing it has been worthwhile overall for companies. According to Ingram Micro,  69% percent of IT decision makers in the US believe BYOD is a good thing and according to ITProPortal, an employee that is able to use his or her own device works on average two hours more per day.

BYOD is just the beginning**

As more people work from home and the number of SaaS products available to them continues to explode, employees are not just bringing their own device, they’re now embracing Bring Your Own Software (BYOS).

BYOS is an emerging trend where teams and employees discover the software that they prefer to use and sign up to it using their personal or corporate credit card. In the past, IT or procurement were the all-powerful gatekeepers of software. If employees wanted access to new software, they had to put in a request and wait (hope…) for it to be approved.

The way that we do work is changing. Employees are increasingly used to working how they want, when they want, with whatever software works best for them. And with the ability to sign up for just about any SaaS with a credit card, IT and Software Asset Management teams are increasingly becoming sidelined.

Bring Your Own Software (BYOS) is here to stay**

By putting procuring software through a credit card, employees are able to use the software they want right away, without going through official software asset management or procurement processes. And because cloud software is usually accessed through a browser, the usual procedures companies take to prevent unauthorised software use like preventing the installation of new software is ineffective.

This behaviour is already happening and is widespread among companies of all sizes. In a recent survey of 200 CIOs by Broadcade, 83% had discovered unauthorised software in their companies, despite many saying that their companies had policies that prevented SaaS purchases without approval and governance.

Software Asset Management and Procurement teams and CIOs are beginning to realise that SaaS is getting out of control. A survey by the Cloud Security Alliance found that 72% of IT executives don’t know how many shadow IT applications are being used within their organisation. This isn’t a surprise. For companies with 800-1,000 people, 7-10 new SaaS products are adopted by at least one person in a company every month and more than 50% of technology spending worldwide now occurs outside of IT budgets according to IDC.

Return of the Software Asset Manager**

Just because Software Asset Management teams are being sidelined by SaaS, doesn’t mean that it’s not important. Gartner predicts that by 2020, one-third of successful cyber-attacks on enterprises will be on data located in shadow IT resources like SaaS.

This makes software asset management more important than ever. The rise of BYOS increases risk, complicates compliance with SOC2, ISO27001, GDPA and CCPA and increases overheads for companies. Traditional methods of locking down computers or detecting software doesn’t work - it’s very hard to prevent SaaS to be used in a browser and detecting unauthorised SaaS is too late because you’ve already got a reportable breach.

The challenge for Software Asset Management teams is to figure out how to embrace SaaS, capture the best of the entrepreneurial spirit of the employees across a business and come up with ways to bring Shadow IT and SaaS into the light. This means finding a way that is as easy for an employee as pulling out his or her own credit card.

The challenge is on. With 50% of IT spend undocumented, getting it right is important. Software Asset Management Teams rose to the challenge of BYOD. Now it’s time to take on BYOS. Cledara is built to help.


Contents

Contents

The software management solution for finance teams.

Learn more

Subscribe to our newsletter

Receive the latest insights in your inbox

Nikesh Ashar

I currently look after Quality Assurance and IT at Cledara. Having built a robust QA process and now a team, we work with Product and Engineering to make sure that our software is robust and well tested.

Share this post

Subscribe to our newsletter and stay informed on the latest SaaS insights

Explore more

Explore more

Have You Secured Your Software Stack?

SaaS security is a set of practices, protocols, and processes that have the primary goal of ensuring the security of a company's SaaS environment.
Read more

What is SaaS?

Software as a Service (SaaS) is a cloud computing model that allows users to access applications over the Internet. But there's far more to it - find out here.
Read more

What is an SBOM?

Software providers must now meet SBOM requirements in order to qualify as US public sector vendors. Learn everything you need to know about SBOMs in this post.
Read more

Avoid $65m Cloud Bills with a Cloud Management Platform

Wondering if it's time to adopt a Cloud Management Platform? Here's everything you need to know before investing.
Read more

What Is Software Asset Management? [Benefits & Best Practices]

Software Asset Management helps organizations gain control and optimize software costs and usage. Learn more about its benefits and some best practices in this post.
Read more

IT Governance Framework: A Guide for Enterprise Companies

IT governance is a formal way to integrate an IT strategy into an organization's business strategy. In this post, we’ll cover everything you need to know about it.
Read more

Technology Business Management (TBM): A Guide for Scaleups

Rationalize your IT expenses and align them with your business goals through Technology Business Management (TBM). Here's what you need to know.
Read more

What is Application Rationalization and How to Implement It

Application rationalization is the process of assessing and streamlining an organization's software applications to improve efficiency, reduce redundancy, and optimize resource allocation.
Read more

How to Write a Good Software Business Case [+ Template]

Do you think your company needs to invest in new software? In this post, you'll learn how to write a good software business case. Free template included.
Read more

Is Shadow IT Hiding in Your Company? Tips for Bringing Informal SaaS Out of the Dark

Unsure about how to tackle hidden software used throughout the company? You're not alone.
Read more

A Complete Guide to Optimizing Your Website Hosting Costs

Rethinking your cloud spending as you grow? In this guide, we share everything you need to know to reduce hosting costs without affecting your users' experience.
Read more

Software Tech Stack: Definition + How to Manage Yours

Learn what a software tech stack is, why it is important and how to manage one with Cledara.
Read more

9 Software Management Best Practices to Streamline Your IT

Here's how to manage your software investments effectively.
Read more

4 Software Management Processes COOs Should Implement Today

To boost productivity and ensure the whole business is empowered to work efficiently, strong software management is key.
Read more

How Software Management Helps Startup COOs Scale Operations

Ensure that the tools powering your business drive real value.
Read more