You can also spend more and purchase highly advanced functionality. For example, you can register and remotely manage all corporate mobile devices deployed on a network, from initial configuration and setup to automatically applying and tracking corporate policies. With some of these solutions, you can do very cool things such as enforce pass-code locking, or even wipe out all enterprise content when a device is lost or stolen, while maintaining personal files such as music, pictures or videos. As you can imagine, this advanced functionality comes at a high cost.
* The Wireless Pane of Glass Approach: Many IT organizations are focusing on managing their underlying wireless infrastructure -- like Cisco and Aruba wireless LANs -- while at the same time understanding who's using their wireless networks and for what purposes. Capabilities offered in this space range from live maps of controllers, LWAPs and user devices, to detection of rogue access points or reports on the encryption level and configuration of access points.
Some solutions can track user activity on wireless networks to the point of spookiness: You can track individual employees or visitors as they move around the building -- how many meetings, where they took place, for how long -- even where they had lunch. This is huge for security and legal issues, but also allows IT to have a complete picture of what departments and specific users are eating up bandwidth for work (and non-work related) tasks.
As we head into 2013 budget planning, we'll really see how IT plans are shifting because of BYOD -- and who is still ignoring it.
Carboni is president of Ipswitch's Network Management Division.
Read more about anti-malware in Network World's Anti-malware section.