Taming Consumer Devices In Business

The past few years have seen IT managers keen to lock down their networks in an effort to safeguard against the threats posed by unsecured employee devices; however, this trend seems to be reversing. A recent study revealed that a third of UK businesses are planning to implement Bring Your Own Device (BYOD) to work schemes.

Gone are the days of companies getting away with using single-vendor infrastructures. Consumer technology has evolved, resulting in a new generation of employees who have grown up with the freedom to enjoy a range of connected devices (from smart phones and PDAs to Xboxes) now entering the workforce.

The Y generation wants more

Representing the future of industry, this so-called Generation Y is not only bright and tech-savvy, but also increasingly demanding. They expect to be able to switch seamlessly between Facebook and work, from calendars to YouTube, all of which means that consumer devices are now encroaching on the business network.

To anyone working within the industry, it is becoming increasingly clear that we are reaching the point where IT managers and directors must accommodate this shift within their overall strategy. They need to learn to embrace this new way of operating or, at the very least, find a way of working around it. Perhaps this is why research recently undertaken by Aberdeen Group revealed that “bring your own device” policies have been implemented in as many as 75 percent of enterprises.

For the IT Director, this is rather more easily said than done. The task of opening up a network is accompanied by the dilemma of having to strike a balance between the desire to offer access and the need for control.

There have been a number of high profile cases where companies have misjudged this balance and have suffered as a result. The example of the T-Mobile employee, prosecuted for selling the personal details of thousands of customers to rival companies, is a case in point. Compatibility issues, particularly surrounding connectivity (an example of which being the iPad not working with certain applications or web browsers), further complicate the process.

A struggle to secure data

This creates a great deal of work and presents a very real problem for IT directors, more and more of whom are turning to wireless networking to solve it. At present, most corporate IT departments use basic wireless functionality. As a result, companies need to be asking a number of questions at the access layer – how does the network currently operate? How could it be used to incorporate multiple devices? And how can they regulate and police them as well? These are some of the recurring issues that we are helping many of our clients work around.

Continued on page 2 

Page: 1 2

adminuk

Recent Posts

Google Consolidates DeepMind And AI Research Teams

AI push sees Alphabet's Google saying it will consolidate its AI teams in its Research…

17 hours ago

Apple Pulls WhatsApp, Threads From China App Store

Beijing orders Apple to pull Meta's WhatsApp and Threads from its Chinese App Store over…

20 hours ago

Intel Foundry Assembles Next Gen Chip Machine From ASML

Key milestone sees Intel Foundry assemble ASML's new “High NA EUV” lithography tool, to begin…

1 day ago

Creating Deepfake Porn Without Consent To Become A Crime

People who create sexually explicit ‘deepfakes’ of adults will face prosecution under a new law…

2 days ago

Google Fires 28 Staff Over Israel Protest, Undertakes More Layoffs

Protest at cloud contract with Israel results in staff firings, in addition to layoffs of…

2 days ago