BYOD in quotes, 20 januari 2012

Het aantal artikelen rond de onderwerpen BYOD, Consumerization of IT en Mobile Device Management neemt in hoog tempo toe. Dagelijks selecteer ik artikelen voor het Evernote notitieboekje. Wat is er de afgelopen twee weken voorbij gekomen? De quotes zijn, net als de vorige keer, niet geheel willekeurig bij elkaar geplaatst en geven een indruk van hoe er over BYOD wordt gedacht.

The reason most companies – especially midsize ones – do a BYOD transition is not to increase productivity but to palm off telecom costs onto employees. Their goal is to reduce absolute cost; productivity and employee satisfaction are mere side effects. That of course is the problem: Their goals are naive, so what should be viewed as a positive outcome isn’t. The problem is not that BYOD itself is negative, it’s that many companies do it for the wrong reason and don’t get what they wanted. Infoworld

I’ll skip the potential cost savings; relative to the extent of your enterprise, a move to mobile devices in replacement of PCs will indeed save a little cash, but this will quickly be eaten up by the IT departments need to make data available and secure. CFO World

“Employees feel increasingly empowered to make their own technology decisions and say that corporate IT is just not as flexible and convenient as the personal consumer devices and software applications they use in their personal lives,” commented Jeanne Harris, executive research fellow and senior executive at the Accenture Institute for High Performance. “Employees are surprisingly willing to pay in order to use the technologies they love at work, and as a result, they are going to use them – with or without their company’s approval.”, Accenture.

The survey found that 91% of IT and business professionals used their iPads for work, even though only a quarter of the devices had been supplied for corporate use. Like consumers, business professionals use the device for media consumption, but they use their devices on the road far more frequently than anywhere else. Some 79% of IT professionals said they always use their iPads on the road and 54% use the device at home. IDG notes that the iPad hasn’t really prompted the majority of IT and business professionals to abandon any other devices, however, with only 12% saying that their iPad has completely replaced their laptops and just 6% saying it has supplanted their PCs. However, 72% said they were using their notebooks less because of the iPad, with 83% of corporate users describing themselves as being loyal to Apple’s device. IDG

Now let’s fast-forward our story by 3 months. I just found out that Joe Green has been skimming the books. Time for Joe to go. I log in to my secure IT control panel and shut Joe down. I still hold all his data, all his email, all my valuable intellectual property. I wipe his remote machine clean of all my stuff in seconds. Terapin

Among 520 CIOs polled, 77% said they worry that further consumerization of IT will lead to greatly increased business risks. At the same time, consumerization is blurring the lines of IT responsibility. At 74% of enterprises polled, CIOs said consumerization fuels unrealistic expectations, as end users start assuming IT will address tech issues that sit outside the core infrastructure. Compuware.

BYOD presents a significant cultural shift for the CIO and their organization. On one hand, it presents increased complexity to management of data. On the other hand, it improves flexibility, capital exposure and employee moral. Even with the challenges, there are tools available today to manage BYOD effectively. In addition, organizational culture changes are needed to understand and engage a BYOD model within the company. BYOD is just one of many significant shifts in the IT world today…with many more to come. Tim Crawford

As we start 2012, we can expect to see a continuance of data breaches and increasing cyber attacks. Taking a look back at 2011, we have learned that no system is ever 100% secure no matter the name or the size of an organization. It’s important for businesses and organizations to know what they need to be prepared for and to take steps to help minimize the threats that do not appear to be going away. […] I fear that the attention that was given to the data breach in 2011 may diminish being that the data breach will become commonplace in 2012 and going forward. Whether a data breach makes the front page news is not the point. Infosec Island.

In fact, the number of consultancies – from the big names to “who are these people?” firms – and tech vendors that have recently discovered BYOD is huge. Given that this phenomenon has had a good 18 months of CIO and media attention, I’d stay far away from any vendor that has just tuned in to the opportunity. They may claim they were monitoring the market until IT was ready for proactive BYOD, but I bet most are carpetbaggers who have no real experience or insight, and will simply sell you the same tired security and management products and services they always have. (I’m talking to you, Symantec and McAfee.) Computerworld

BYOD can be a nightmare for senior IT management for a variety of reasons including high on the list issues around device support and system security. There is no guarantee any employee provided device, once connected to your corporate network, is going to behave in a predictable and secure manner. The issues range from OS level network disturbances through information theft (knowingly or unknowingly.) Focus

There are a few ways that companies can get a handle on this, both of which will require some investment. The first way is for companies to build up their own private clouds to exclusively handle data used by enterprise apps. SAP CIO Oliver Bussmann says that private clouds will give companies the ability to effectively segregate sensitive data while still ensuring that workers have easy access to it on their mobile devices. […] The second solution for companies looking to get a handle on mobile applications is to simply build their own mobile app stores that workers can use to get all approved applications for company use. This can ensure that companies can preapprove popular apps for users and thus know exactly what apps have access to their corporate network. And as Croft notes, companies will want to keep their workers using their own app stores by offering a wide array of popular games and non-work apps so that you create a “user-friendly environment to have apps that can be fun and not just business apps.” In other words, companies should expect to support Angry Birds and Fruit Ninja on their company stores along with mission-critical productivity apps. Networkworld

Back on my own example, I’m also using a tablet and a smart phone to access my company resources especially when I’m travelling. This dramatically improves my productivity and my response time. While using these complementary mobile devices on the road, I do expect the same level of experience and security as the one I can benefit on my laptop when I connect from home. And then it starts to be a bit scaring, because I’m not using my own protected wireless network to connect to the Internet, but rather a public and untrusted Wi-Fi or 3G network without any specific security in place. Thus the crucial importance to also protect your data from these new mobile devices, exactly the same way you protect them from your laptop. In fact you need to have exactly the same set of security components, protecting both the connection and the device itself, installed on your tablet or/and smart phone. Juniper

The only way to guarantee equitable educational experiences is for each student to have access to the same materials and learning opportunities. BYOD leaves this to chance with more affluent students continuing to have an unfair advantage over their classmates. This is particularly problematic in a society with growing economic disparity. BYOD – Worst Idea of the 21st Century?

“The biggest disruptive force in the computer equipment market thus is … Apple,” the research outfit says in its report. “This is a surprise, because Apple has not and does not directly address the corporate market, while turning a wide variety of consumer technology markets upside-down. But its rapid growth in the corporate market has been the big surprise of 2011, and it will be even more of a factor in 2012.” Forrester


Geplaatst op 20 januari 2012, in Elders gelezen en getagd als , , . Markeer de permalink als favoriet. Een reactie plaatsen.

Geef een reactie

Vul je gegevens in of klik op een icoon om in te loggen. logo

Je reageert onder je account. Log uit /  Bijwerken )

Google+ photo

Je reageert onder je Google+ account. Log uit /  Bijwerken )


Je reageert onder je Twitter account. Log uit /  Bijwerken )

Facebook foto

Je reageert onder je Facebook account. Log uit /  Bijwerken )


Verbinden met %s

%d bloggers liken dit: