Featured Video, Video

Virtual Reality panel at Power of 4 Tech Forum

Experts examined the ways that virtual reality can be innovatively deployed to put users at the heart of the action
Don't show me again

CIO Soundbites: What’s your BYOD policy?

ideaIn a new addition to a revamped CNME, we talk to the region’s IT decision makers for their short takes on the issues that comprise their everyday ‘to do’ lists. We’re kicking off with the issue of mobility, posing the question: ‘What is your policy on BYOD?’ 

Muhammad Albakri


Muhammad Ali M. Albakri, CIO and CFO, Saudi Arabian Airlines:

“BYOD is becoming mainstream in our mobile workforce. VPN access is enabled on our corporate wireless networks and a multi-profile mechanism is made to cover customer requirements. To gain access to corporate networks via personal devices, staff use their credentials to connect, and the service is being rolled out to all corporate sites with wireless access infrastructure throughout the Kingdom.”


_CPI2026Muhammad Javeed, Head of IT, Paris Sorbonne University Abu Dhabi:

“A BYOD program helps our community in supporting the ways they want to work, teach, and learn by providing them the opportunity to use the most appropriate tool for the job, while IT takes care of information privacy, support and network security.”



1-0198Madhav Rao, Chief Information Officer, Lulu Group:

“Enterprise applications and resources are protected in a separate container within their devices in our policy. Device control policies such as allow/deny applications, password policy, remote lock and remote wipe are enforced. Users are prevented from downloading and installing any application which is not trusted. For easy use, users can securely on-board and configure their devices without IT support.”


_CPI1401Vignesh Unadkat, Director of IT and Promotions, Thumbay Group:

“Having a BYOD Policy for any company is very important as many organisations don’t provide devices to employees, so they are asked to use their own. We need to consider acceptable use, devices and support, reimbursement, security, risk and liabilities when determining BYOD polices.”

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.


The free newsletter covering the top industry headlines