We need bullets.
I can see it makes sense at some stage in the future once the topology of networks is changed and we can health check hardware security and configuration on the run but right now its a bloody nightmare.
It's too simplistic to think it's manager being Anal that won't allow uptake, that's like criticising your boss for not allowing Russian roulette in the canteen.
I know having the wrong tools for the job or not embracing the right technology limits the user dramatically (I've drawn electronic schematics in Autocad 14 without any existing symbols because the boss didn't believe in free schematic capture).
Moving technology forward, increasing engagement and resulting efficiency is great but these uncontrolled devices shoehorned into existing network security models is madness IMO.
Dropbox et al, IPV6 and others are breaking the current models so we need to redesign access methods, topology and security checks. As part of that rework design-in BYOD options so we can see if the vociferous proponents of the technology actually do suddenly become happier in their job and more efficient.